mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
October
List overview
Download
Dev
----- 2024 -----
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
October 2019
dev@openeuler.org
12 participants
3382 discussions
Start a n
N
ew thread
机密计算SIG例会
by openEuler conference
04 Jun '24
04 Jun '24
您好! sig-confidential-computing 邀请您参加 2024-06-06 14:30 召开的WeLink会议 会议主题:机密计算SIG例会 会议内容: 1.社区进展同步 欢迎大家申报议题 会议链接:https://meeting.huaweicloud.com:36443/#/j/983435765
会议纪要:https://etherpad.openeuler.org/p/sig-confidential-computing-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-confidential-computing invites you to attend the WeLink conference will be held at 2024-06-06 14:30, The subject of the conference is 机密计算SIG例会, Summary: 1.社区进展同步 欢迎大家申报议题 You can join the meeting at
https://meeting.huaweicloud.com:36443/#/j/983435765
. Add topics at
https://etherpad.openeuler.org/p/sig-confidential-computing-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
openEuler CloudNative SIG双周例会
by openEuler conference
03 Jun '24
03 Jun '24
您好! sig-CloudNative 邀请您参加 2024-06-04 16:00 召开的Tencent会议(自动录制) 会议主题:openEuler CloudNative SIG双周例会
会议链接:https://meeting.tencent.com/dm/hPbxuglan4ei
会议纪要:https://etherpad.openeuler.org/p/sig-CloudNative-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-CloudNative invites you to attend the Tencent conference(auto recording) will be held at 2024-06-04 16:00, The subject of the conference is openEuler CloudNative SIG双周例会, You can join the meeting at
https://meeting.tencent.com/dm/hPbxuglan4ei
. Add topics at
https://etherpad.openeuler.org/p/sig-CloudNative-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
TC例会
by openEuler conference
03 Jun '24
03 Jun '24
您好! TC 邀请您参加 2024-06-05 10:00 召开的WeLink会议(自动录制) 会议主题:TC例会 会议内容: tc双周例会,欢迎大家申报议题 会议链接:https://meeting.huaweicloud.com:36443/#/j/981702395
会议纪要:https://etherpad.openeuler.org/p/TC-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! TC invites you to attend the WeLink conference(auto recording) will be held at 2024-06-05 10:00, The subject of the conference is TC例会, Summary: tc双周例会,欢迎大家申报议题 You can join the meeting at
https://meeting.huaweicloud.com:36443/#/j/981702395
. Add topics at
https://etherpad.openeuler.org/p/TC-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
[Release] openeuler 22.03 LTS SP4 RC3版本构建通知
by yangchaohao
03 Jun '24
03 Jun '24
各位openeuler社区的maintainer、 committer和contributor们好: 社区CICD sig基于release sig制定openeuler 22.03 LTS SP4版本的release plan,将于6月5号12点创建快照,开始构建RC3版本,此时间点之后合入PR默认不带入版本! 同时将在 RC3 转测时冻结分支,只允许bug fix,请各位注意时间点! 发件人: yangchaohao 发送时间: 2024年5月28日 14:36 收件人: 'dev(a)openeuler.org' <dev(a)openeuler.org>; 'release(a)openeuler.org' <release(a)openeuler.org> 主题: [Release] openeuler 22.03 LTS SP4 RC2版本构建通知 各位openeuler社区的maintainer、 committer和contributor们好: 社区CICD sig基于release sig制定openeuler 22.03 LTS SP4版本的release plan,将于5月29号12点创建快照,开始构建RC2版本,此时间点之后合入PR默认不带入版本! 发件人: yangchaohao 发送时间: 2024年5月19日 22:52 收件人: dev(a)openeuler.org<mailto:dev@openeuler.org>; release(a)openeuler.org<mailto:release@openeuler.org> 主题: [Release] openeuler 22.03 LTS SP4 alpha&RC1版本构建通知 各位openeuler社区的maintainer、 committer和contributor们好: 社区CICD sig基于release sig制定openeuler 22.03 LTS SP4版本的release plan,将于5月22号12点创建快照,开始构建alpha&RC1版本,此时间点之后合入PR默认不带入版本! ________________________________ 杨超豪 Yang Chaohao Email:yangchaohao(a)huawei.com<mailto:yangchaohao@huawei.com>
1
0
0
0
Gnome sig 例会
by openEuler conference
03 Jun '24
03 Jun '24
您好! GNOME 邀请您参加 2024-06-04 15:00 召开的WeLink会议 会议主题:Gnome sig 例会 会议内容: 讨论新晋committer 会议链接:https://meeting.huaweicloud.com:36443/#/j/984438582
会议纪要:https://etherpad.openeuler.org/p/GNOME-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! GNOME invites you to attend the WeLink conference will be held at 2024-06-04 15:00, The subject of the conference is Gnome sig 例会, Summary: 讨论新晋committer You can join the meeting at
https://meeting.huaweicloud.com:36443/#/j/984438582
. Add topics at
https://etherpad.openeuler.org/p/GNOME-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
sig-compliance双周例会
by openEuler conference
03 Jun '24
03 Jun '24
您好! sig-compliance 邀请您参加 2024-06-06 10:00 召开的Zoom会议(自动录制) 会议主题:sig-compliance双周例会 会议链接:https://us06web.zoom.us/j/81128183266?pwd=mSFgPl3wTDPgkpdqPJXQpa95Zizm0W.1
会议纪要:https://etherpad.openeuler.org/p/sig-compliance-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-compliance invites you to attend the Zoom conference(auto recording) will be held at 2024-06-06 10:00, The subject of the conference is sig-compliance双周例会, You can join the meeting at
https://us06web.zoom.us/j/81128183266?pwd=mSFgPl3wTDPgkpdqPJXQpa95Zizm0W.1
. Add topics at
https://etherpad.openeuler.org/p/sig-compliance-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
[Release] openEuler update_20240529版本发布公告
by update版本发布邮箱
31 May '24
31 May '24
主题: openEuler update_20240529版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。 本公示分为九部分: 1、openEuler-20.03-LTS-SP1 Update 20240529发布情况及待修复缺陷 2、openEuler-22.03-LTS Update 20240529发布情况及待修复缺陷 3、openEuler-22.03-LTS-SP1 Update 20240529发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP2 Update 20240529发布情况及待修复缺陷 5、openEuler-20.03-LTS-SP4 Update 20240529发布情况及待修复缺陷 6、openEuler-22.03-LTS-SP3 Update 20240529发布情况及待修复缺陷 7、openEuler 关键组件待修复CVE 清单 8、openEuler 关键组件待修复缺陷清单 9、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2024/06/07)提供 update_20240605 版本。 openEuler-20.03-LTS-SP1 Update 20240529 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题8个,已知漏洞90个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBUZ?from=project-i…
CVE修复: CVE 仓库 score I4BYQY:CVE-2019-10174<
https://gitee.com/src-openeuler/infinispan/issues/I4BYQY
> infinispan 8.8 I9QRRC:CVE-2024-35950<
https://gitee.com/src-openeuler/kernel/issues/I9QRRC
> kernel 7 I9L9O3:CVE-2024-27051<
https://gitee.com/src-openeuler/kernel/issues/I9L9O3
> kernel 6.6 I9L9O8:CVE-2024-27028<
https://gitee.com/src-openeuler/kernel/issues/I9L9O8
> kernel 6.6 I9RFET:CVE-2023-52818<
https://gitee.com/src-openeuler/kernel/issues/I9RFET
> kernel 6.6 I9LKE0:CVE-2022-48697<
https://gitee.com/src-openeuler/kernel/issues/I9LKE0
> kernel 6.5 I9L5KV:CVE-2024-26996<
https://gitee.com/src-openeuler/kernel/issues/I9L5KV
> kernel 6.4 I9RLZ0:CVE-2021-47335<
https://gitee.com/src-openeuler/kernel/issues/I9RLZ0
> kernel 6.4 I9LG5I:CVE-2024-4418<
https://gitee.com/src-openeuler/libvirt/issues/I9LG5I
> libvirt 6.2 I9L5LW:CVE-2024-26974<
https://gitee.com/src-openeuler/kernel/issues/I9L5LW
> kernel 5.8 I9RFON:CVE-2023-52847<
https://gitee.com/src-openeuler/kernel/issues/I9RFON
> kernel 5.8 I9L4RJ:CVE-2024-26960<
https://gitee.com/src-openeuler/kernel/issues/I9L4RJ
> kernel 5.5 I9L4ZX:CVE-2024-26976<
https://gitee.com/src-openeuler/kernel/issues/I9L4ZX
> kernel 5.5 I9L5A8:CVE-2024-27001<
https://gitee.com/src-openeuler/kernel/issues/I9L5A8
> kernel 5.5 I9L5DF:CVE-2024-26982<
https://gitee.com/src-openeuler/kernel/issues/I9L5DF
> kernel 5.5 I9L5DI:CVE-2024-26955<
https://gitee.com/src-openeuler/kernel/issues/I9L5DI
> kernel 5.5 I9L5G5:CVE-2024-26966<
https://gitee.com/src-openeuler/kernel/issues/I9L5G5
> kernel 5.5 I9L5GC:CVE-2024-26958<
https://gitee.com/src-openeuler/kernel/issues/I9L5GC
> kernel 5.5 I9L5GD:CVE-2024-26981<
https://gitee.com/src-openeuler/kernel/issues/I9L5GD
> kernel 5.5 I9L5IO:CVE-2024-27010<
https://gitee.com/src-openeuler/kernel/issues/I9L5IO
> kernel 5.5 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 5.5 I9L5JJ:CVE-2024-26956<
https://gitee.com/src-openeuler/kernel/issues/I9L5JJ
> kernel 5.5 I9L5JZ:CVE-2024-26969<
https://gitee.com/src-openeuler/kernel/issues/I9L5JZ
> kernel 5.5 I9L5KR:CVE-2024-26999<
https://gitee.com/src-openeuler/kernel/issues/I9L5KR
> kernel 5.5 I9L5L5:CVE-2024-26994<
https://gitee.com/src-openeuler/kernel/issues/I9L5L5
> kernel 5.5 I9L5N3:CVE-2024-26965<
https://gitee.com/src-openeuler/kernel/issues/I9L5N3
> kernel 5.5 I9L5OC:CVE-2024-26961<
https://gitee.com/src-openeuler/kernel/issues/I9L5OC
> kernel 5.5 I9L5OD:CVE-2024-27011<
https://gitee.com/src-openeuler/kernel/issues/I9L5OD
> kernel 5.5 I9L9IH:CVE-2024-27073<
https://gitee.com/src-openeuler/kernel/issues/I9L9IH
> kernel 5.5 I9L9IM:CVE-2024-27059<
https://gitee.com/src-openeuler/kernel/issues/I9L9IM
> kernel 5.5 I9L9IX:CVE-2024-27062<
https://gitee.com/src-openeuler/kernel/issues/I9L9IX
> kernel 5.5 I9L9J1:CVE-2024-27388<
https://gitee.com/src-openeuler/kernel/issues/I9L9J1
> kernel 5.5 I9L9J6:CVE-2024-27075<
https://gitee.com/src-openeuler/kernel/issues/I9L9J6
> kernel 5.5 I9L9JK:CVE-2024-27077<
https://gitee.com/src-openeuler/kernel/issues/I9L9JK
> kernel 5.5 I9L9JS:CVE-2024-27072<
https://gitee.com/src-openeuler/kernel/issues/I9L9JS
> kernel 5.5 I9L9NB:CVE-2024-27037<
https://gitee.com/src-openeuler/kernel/issues/I9L9NB
> kernel 5.5 I9L9NF:CVE-2024-27054<
https://gitee.com/src-openeuler/kernel/issues/I9L9NF
> kernel 5.5 I9L9NT:CVE-2024-27046<
https://gitee.com/src-openeuler/kernel/issues/I9L9NT
> kernel 5.5 I9LKDS:CVE-2022-48704<
https://gitee.com/src-openeuler/kernel/issues/I9LKDS
> kernel 5.5 I9LKDT:CVE-2022-48695<
https://gitee.com/src-openeuler/kernel/issues/I9LKDT
> kernel 5.5 I9P06W:CVE-2023-52656<
https://gitee.com/src-openeuler/kernel/issues/I9P06W
> kernel 5.5 I9Q8LQ:CVE-2024-27403<
https://gitee.com/src-openeuler/kernel/issues/I9Q8LQ
> kernel 5.5 I9Q91I:CVE-2024-27428<
https://gitee.com/src-openeuler/kernel/issues/I9Q91I
> kernel 5.5 I9Q94J:CVE-2024-27426<
https://gitee.com/src-openeuler/kernel/issues/I9Q94J
> kernel 5.5 I9Q95M:CVE-2024-27427<
https://gitee.com/src-openeuler/kernel/issues/I9Q95M
> kernel 5.5 I9Q99Q:CVE-2024-35815<
https://gitee.com/src-openeuler/kernel/issues/I9Q99Q
> kernel 5.5 I9Q9CC:CVE-2024-35805<
https://gitee.com/src-openeuler/kernel/issues/I9Q9CC
> kernel 5.5 I9Q9HZ:CVE-2023-52683<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HZ
> kernel 5.5 I9Q9IE:CVE-2024-35835<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IE
> kernel 5.5 I9Q9IT:CVE-2023-52698<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IT
> kernel 5.5 I9QG2A:CVE-2024-35898<
https://gitee.com/src-openeuler/kernel/issues/I9QG2A
> kernel 5.5 I9QG76:CVE-2024-35886<
https://gitee.com/src-openeuler/kernel/issues/I9QG76
> kernel 5.5 I9QGIW:CVE-2024-35922<
https://gitee.com/src-openeuler/kernel/issues/I9QGIW
> kernel 5.5 I9QGLA:CVE-2024-35930<
https://gitee.com/src-openeuler/kernel/issues/I9QGLA
> kernel 5.5 I9QRIQ:CVE-2024-35976<
https://gitee.com/src-openeuler/kernel/issues/I9QRIQ
> kernel 5.5 I9QRN6:CVE-2024-35997<
https://gitee.com/src-openeuler/kernel/issues/I9QRN6
> kernel 5.5 I9R4K2:CVE-2021-47284<
https://gitee.com/src-openeuler/kernel/issues/I9R4K2
> kernel 5.5 I9R4KL:CVE-2022-48710<
https://gitee.com/src-openeuler/kernel/issues/I9R4KL
> kernel 5.5 I9RBLZ:CVE-2021-47455<
https://gitee.com/src-openeuler/kernel/issues/I9RBLZ
> kernel 5.5 I9RD7J:CVE-2021-47497<
https://gitee.com/src-openeuler/kernel/issues/I9RD7J
> kernel 5.5 I9RE1F:CVE-2023-52835<
https://gitee.com/src-openeuler/kernel/issues/I9RE1F
> kernel 5.5 I9RE4X:CVE-2023-52817<
https://gitee.com/src-openeuler/kernel/issues/I9RE4X
> kernel 5.5 I9RFE5:CVE-2023-52840<
https://gitee.com/src-openeuler/kernel/issues/I9RFE5
> kernel 5.5 I9RFEA:CVE-2023-52813<
https://gitee.com/src-openeuler/kernel/issues/I9RFEA
> kernel 5.5 I9RFK5:CVE-2023-52868<
https://gitee.com/src-openeuler/kernel/issues/I9RFK5
> kernel 5.5 I9RFL9:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9RFL9
> kernel 5.5 I9LKE1:CVE-2022-48702<
https://gitee.com/src-openeuler/kernel/issues/I9LKE1
> kernel 5.4 I9L5JU:CVE-2024-27008<
https://gitee.com/src-openeuler/kernel/issues/I9L5JU
> kernel 5.3 I9Q94D:CVE-2024-27419<
https://gitee.com/src-openeuler/kernel/issues/I9Q94D
> kernel 5.3 I9L4T8:CVE-2024-26957<
https://gitee.com/src-openeuler/kernel/issues/I9L4T8
> kernel 4 I9L9JG:CVE-2024-27078<
https://gitee.com/src-openeuler/kernel/issues/I9L9JG
> kernel 4 I9L9M2:CVE-2024-27024<
https://gitee.com/src-openeuler/kernel/issues/I9L9M2
> kernel 4 I9L9OA:CVE-2023-52650<
https://gitee.com/src-openeuler/kernel/issues/I9L9OA
> kernel 4 I9H9UK:CVE-2024-21094<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
> openjdk-1.8.0 3.7 I9H9VN:CVE-2024-21085<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
> openjdk-1.8.0 3.7 I9H9U3:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
> openjdk-1.8.0 3.7 I9H9UI:CVE-2024-21011<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
> openjdk-1.8.0 3.7 I9L5H7:CVE-2024-27000<
https://gitee.com/src-openeuler/kernel/issues/I9L5H7
> kernel 3.3 I9L9IF:CVE-2023-52653<
https://gitee.com/src-openeuler/kernel/issues/I9L9IF
> kernel 3.3 I9L9IV:CVE-2023-52652<
https://gitee.com/src-openeuler/kernel/issues/I9L9IV
> kernel 3.3 I9Q9HX:CVE-2024-35847<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HX
> kernel 1 I9QGIK:CVE-2024-35935<
https://gitee.com/src-openeuler/kernel/issues/I9QGIK
> kernel 1 I9R7JN:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9R7JN
> kernel 1 I9RCYN:CVE-2021-47496<
https://gitee.com/src-openeuler/kernel/issues/I9RCYN
> kernel 1 I9Q970:CVE-2024-35806<
https://gitee.com/src-openeuler/kernel/issues/I9Q970
> kernel 0 I9Q9IJ:CVE-2023-52691<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IJ
> kernel 0 I9QGIP:CVE-2024-35936<
https://gitee.com/src-openeuler/kernel/issues/I9QGIP
> kernel 0 I9R4C8:CVE-2021-47269<
https://gitee.com/src-openeuler/kernel/issues/I9R4C8
> kernel 0 I9R4O0:CVE-2021-47393<
https://gitee.com/src-openeuler/kernel/issues/I9R4O0
> kernel 0 I9RB0N:CVE-2021-47473<
https://gitee.com/src-openeuler/kernel/issues/I9RB0N
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变: sendmail-redhat.mc编译时被改变 sendmail #I68UQF:sanlk-reset的-t命令无法正常执行:sanlk-reset的-t命令无法正常执行 sanlock #I9RNFF:[20.03-sp4] mpstat误报高iowait问题:[20.03-sp4] mpstat误报高iowait问题 sysstat #I9NZ3E:【OLK-5.10】 5月主线补丁分析回合:【OLK-5.10】 5月主线补丁分析回合 kernel #I9PGWG:scsi sr驱动存在信息泄露问题:scsi sr驱动存在信息泄露问题 kernel #I9PX8J:回合主线补丁ip: Treat IPv4 segment's lowest address as unicast:回合主线补丁ip: Treat IPv4 segment's lowest address as unicast kernel #I9RDP6:CVE-2023-52840:CVE-2023-52840 kernel #I9RZC8:[PATCH] sched/rt: Fix rt_runtime leaks with cpu hotplug and RT_RUNTIME_SHARE:[PATCH] sched/rt: Fix rt_runtime leaks with cpu hotplug and RT_RUNTIME_SHARE kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 缺陷 2021/3/30 10:01 主要 src-openEuler/hadoop bigdata
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
2 openEuler-20.03-LTS-SP1 I5OYJZ kernel源码包构建失败 任务 2022/8/31 11:21 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OYJZ
3 openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 缺陷 2022/10/28 15:22 无优先级 src-openEuler/mate-desktop sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
4 openEuler-20.03-LTS-SP1 I8B80Y gcc中LTO的功能好像出现异常 任务 2023/10/26 19:15 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8B80Y
5 openEuler-20.03-LTS-SP1 I9O25N [20.03-LTS-SP1]安装apr-util-devel有报错提示 缺陷 2024/5/10 10:13 次要 src-openEuler/apr-util Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9O25N
6 openEuler-20.03-LTS-SP1-round-3 I9O8SA 【24.03-LTS-RC3】DDE桌面单击任务栏电源按钮无反应 任务 2024/5/10 17:26 无优先级 src-openEuler/dde sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I9O8SA
openEuler-22.03-LTS Update 20240529 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题7个,已知漏洞68个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBUT?from=project-i…
CVE修复: CVE 仓库 score I4BYQY:CVE-2019-10174<
https://gitee.com/src-openeuler/infinispan/issues/I4BYQY
> infinispan 8.8 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I9KHGQ:CVE-2022-48651<
https://gitee.com/src-openeuler/kernel/issues/I9KHGQ
> kernel 7.8 I8BFS5:CVE-2023-5557<
https://gitee.com/src-openeuler/tracker3-miners/issues/I8BFS5
> tracker3-miners 7.7 I9JFG0:CVE-2024-26923<
https://gitee.com/src-openeuler/kernel/issues/I9JFG0
> kernel 7 I9LG5I:CVE-2024-4418<
https://gitee.com/src-openeuler/libvirt/issues/I9LG5I
> libvirt 6.2 I9L4ZX:CVE-2024-26976<
https://gitee.com/src-openeuler/kernel/issues/I9L4ZX
> kernel 5.5 I9L5GC:CVE-2024-26958<
https://gitee.com/src-openeuler/kernel/issues/I9L5GC
> kernel 5.5 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 5.5 I9L5JW:CVE-2024-26950<
https://gitee.com/src-openeuler/kernel/issues/I9L5JW
> kernel 5.5 I9L5M6:CVE-2024-26972<
https://gitee.com/src-openeuler/kernel/issues/I9L5M6
> kernel 5.5 I9L5N3:CVE-2024-26965<
https://gitee.com/src-openeuler/kernel/issues/I9L5N3
> kernel 5.5 I9L5OC:CVE-2024-26961<
https://gitee.com/src-openeuler/kernel/issues/I9L5OC
> kernel 5.5 I9L9IH:CVE-2024-27073<
https://gitee.com/src-openeuler/kernel/issues/I9L9IH
> kernel 5.5 I9L9IM:CVE-2024-27059<
https://gitee.com/src-openeuler/kernel/issues/I9L9IM
> kernel 5.5 I9L9J6:CVE-2024-27075<
https://gitee.com/src-openeuler/kernel/issues/I9L9J6
> kernel 5.5 I9L9LY:CVE-2024-27045<
https://gitee.com/src-openeuler/kernel/issues/I9L9LY
> kernel 5.5 I9Q9E2:CVE-2024-35845<
https://gitee.com/src-openeuler/kernel/issues/I9Q9E2
> kernel 5.5 I9Q9FV:CVE-2023-52685<
https://gitee.com/src-openeuler/kernel/issues/I9Q9FV
> kernel 5.5 I9Q9HO:CVE-2024-35849<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HO
> kernel 5.5 I9QGLA:CVE-2024-35930<
https://gitee.com/src-openeuler/kernel/issues/I9QGLA
> kernel 5.5 I9RE4X:CVE-2023-52817<
https://gitee.com/src-openeuler/kernel/issues/I9RE4X
> kernel 5.5 I9RFEA:CVE-2023-52813<
https://gitee.com/src-openeuler/kernel/issues/I9RFEA
> kernel 5.5 I9RFL9:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9RFL9
> kernel 5.5 I9KHGU:CVE-2022-48641<
https://gitee.com/src-openeuler/kernel/issues/I9KHGU
> kernel 5.5 I9L5DF:CVE-2024-26982<
https://gitee.com/src-openeuler/kernel/issues/I9L5DF
> kernel 5.5 I9P06W:CVE-2023-52656<
https://gitee.com/src-openeuler/kernel/issues/I9P06W
> kernel 5.5 I9Q8M4:CVE-2024-27407<
https://gitee.com/src-openeuler/kernel/issues/I9Q8M4
> kernel 5.5 I9Q8ZA:CVE-2024-35791<
https://gitee.com/src-openeuler/kernel/issues/I9Q8ZA
> kernel 5.5 I9Q919:CVE-2023-52664<
https://gitee.com/src-openeuler/kernel/issues/I9Q919
> kernel 5.5 I9Q939:CVE-2024-35818<
https://gitee.com/src-openeuler/kernel/issues/I9Q939
> kernel 5.5 I9Q94J:CVE-2024-27426<
https://gitee.com/src-openeuler/kernel/issues/I9Q94J
> kernel 5.5 I9Q95M:CVE-2024-27427<
https://gitee.com/src-openeuler/kernel/issues/I9Q95M
> kernel 5.5 I9Q9CC:CVE-2024-35805<
https://gitee.com/src-openeuler/kernel/issues/I9Q9CC
> kernel 5.5 I9Q9HZ:CVE-2023-52683<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HZ
> kernel 5.5 I9Q9I8:CVE-2024-35844<
https://gitee.com/src-openeuler/kernel/issues/I9Q9I8
> kernel 5.5 I9Q9IE:CVE-2024-35835<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IE
> kernel 5.5 I9Q9IT:CVE-2023-52698<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IT
> kernel 5.5 I9QG2A:CVE-2024-35898<
https://gitee.com/src-openeuler/kernel/issues/I9QG2A
> kernel 5.5 I9QGIW:CVE-2024-35922<
https://gitee.com/src-openeuler/kernel/issues/I9QGIW
> kernel 5.5 I9QGKD:CVE-2024-35940<
https://gitee.com/src-openeuler/kernel/issues/I9QGKD
> kernel 5.5 I9QRA8:CVE-2024-36006<
https://gitee.com/src-openeuler/kernel/issues/I9QRA8
> kernel 5.5 I9QRIQ:CVE-2024-35976<
https://gitee.com/src-openeuler/kernel/issues/I9QRIQ
> kernel 5.5 I9QRN6:CVE-2024-35997<
https://gitee.com/src-openeuler/kernel/issues/I9QRN6
> kernel 5.5 I9R4NB:CVE-2021-47421<
https://gitee.com/src-openeuler/kernel/issues/I9R4NB
> kernel 5.5 I9RBLZ:CVE-2021-47455<
https://gitee.com/src-openeuler/kernel/issues/I9RBLZ
> kernel 5.5 I9RE1F:CVE-2023-52835<
https://gitee.com/src-openeuler/kernel/issues/I9RE1F
> kernel 5.5 I9RFIR:CVE-2023-52844<
https://gitee.com/src-openeuler/kernel/issues/I9RFIR
> kernel 5.5 I9L5JU:CVE-2024-27008<
https://gitee.com/src-openeuler/kernel/issues/I9L5JU
> kernel 5.3 I9Q94D:CVE-2024-27419<
https://gitee.com/src-openeuler/kernel/issues/I9Q94D
> kernel 5.3 I9L9IG:CVE-2024-27389<
https://gitee.com/src-openeuler/kernel/issues/I9L9IG
> kernel 4.7 I9E6TH:CVE-2024-26814<
https://gitee.com/src-openeuler/kernel/issues/I9E6TH
> kernel 4.4 I9L9OA:CVE-2023-52650<
https://gitee.com/src-openeuler/kernel/issues/I9L9OA
> kernel 4 I9KHL5:CVE-2022-48644<
https://gitee.com/src-openeuler/kernel/issues/I9KHL5
> kernel 4 I9H9UK:CVE-2024-21094<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
> openjdk-1.8.0 3.7 I9H9VN:CVE-2024-21085<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
> openjdk-1.8.0 3.7 I9H9U3:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
> openjdk-1.8.0 3.7 I9H9UI:CVE-2024-21011<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
> openjdk-1.8.0 3.7 I9L5H7:CVE-2024-27000<
https://gitee.com/src-openeuler/kernel/issues/I9L5H7
> kernel 3.3 I9QGJZ:CVE-2024-35934<
https://gitee.com/src-openeuler/kernel/issues/I9QGJZ
> kernel 1 I9QGK1:CVE-2024-35938<
https://gitee.com/src-openeuler/kernel/issues/I9QGK1
> kernel 1 I9R4L9:CVE-2022-48708<
https://gitee.com/src-openeuler/kernel/issues/I9R4L9
> kernel 1 I9Q9GI:CVE-2023-52694<
https://gitee.com/src-openeuler/kernel/issues/I9Q9GI
> kernel 0 I9Q9HJ:CVE-2023-52690<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HJ
> kernel 0 I9RFRB:CVE-2023-52837<
https://gitee.com/src-openeuler/kernel/issues/I9RFRB
> kernel 0 I9RG0I:CVE-2023-52879<
https://gitee.com/src-openeuler/kernel/issues/I9RG0I
> kernel 0 I9Q970:CVE-2024-35806<
https://gitee.com/src-openeuler/kernel/issues/I9Q970
> kernel 0 I9QGIP:CVE-2024-35936<
https://gitee.com/src-openeuler/kernel/issues/I9QGIP
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变: sendmail-redhat.mc编译时被改变 sendmail #I9R1JE:22.03-LTS系列分支未同步中文翻译补丁:22.03-LTS系列分支未同步中文翻译补丁 cockpit #I9EWLP:CVE-2023-37328修复咨询:CVE-2023-37328修复咨询 gstreamer1-plugins-base #I76JSK:[hulk5.10] xfs文件系统测试专项问题:[hulk5.10] xfs文件系统测试专项问题 kernel #I9DFT4:Backport 5.10.201 LTS patches from upstream:Backport 5.10.201 LTS patches from upstream kernel #I9RB5N:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators kernel #I9RQAS:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-Dailybuild I4UTGM 22.03分支kernel子包perf与libtraceevent有安装冲突 任务 2022/2/22 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4UTGM
2 openEuler-22.03-LTS-Dailybuild I5CHET 使用nftables添加过多的规则时,内核将出现softlockup 任务 2022/6/15 19:33 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5CHET
3 openEuler-22.03-LTS-Dailybuild I5LO4A 【22.03 LTS ARM】鲲鹏 920 x8 安装 OS 时,卡死在内核启动界面。 任务 2022/8/10 17:19 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5LO4A
4 openEuler-22.03-LTS-Dailybuild I5RTUS X86架构下无法对mysql8进行autobolt模式反馈编译,报错 缺陷 2022/9/19 15:47 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
5 openEuler-22.03-LTS-Dailybuild I5XP8E Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支 缺陷 2022/10/26 9:13 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
6 openEuler-22.03-LTS-round-4 I65BIS swapoff 与 do_swap_page race问题 任务 2022/12/8 16:32 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I65BIS
7 openEuler-22.03-LTS-Dailybuild I65UF9 aarch64架构boost icl模板库优化错误 缺陷 2022/12/12 17:17 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
8 openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 缺陷 2023/4/13 16:35 次要 src-openEuler/mariadb DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
9 openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 缺陷 2023/5/12 15:38 次要 src-openEuler/php Base-service
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
10 openEuler-22.03-LTS-Dailybuild I7KBUF pyconfig-64.h中定义了__CHAR_UNSIGNED__ 改变了编译行为,导致程序运行出错 任务 2023/7/11 16:27 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7KBUF
11 openEuler-22.03-LTS update20230726 I7ORCE 【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 缺陷 2023/7/28 14:51 主要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
12 openEuler-22.03-LTS-Dailybuild I7YRN6 openEuler-20.03-LTS-SP3版本与openEuler-22.03-LTS版本x86上gcc参数差异导致编译出的二进制性能下降 任务 2023/9/5 17:06 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7YRN6
13 openEuler-22.03-LTS-Dailybuild I8OWON [openEuler-22.03-LTS]arch64在飞腾D2000内核初始化失败 任务 2023/12/16 9:40 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8OWON
openEuler-22.03-LTS-SP1 Update 20240529 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题8个,已知漏洞80个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBUU?from=project-i…
CVE修复: CVE 仓库 score I4BYQY:CVE-2019-10174<
https://gitee.com/src-openeuler/infinispan/issues/I4BYQY
> infinispan 8.8 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I9F7I0:CVE-2024-20932<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
> openjdk-17 7.5 I9F7K6:CVE-2024-20918<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
> openjdk-17 7.4 I9NWCV:CVE-2024-3154<
https://gitee.com/src-openeuler/runc/issues/I9NWCV
> runc 7.2 I9JFG0:CVE-2024-26923<
https://gitee.com/src-openeuler/kernel/issues/I9JFG0
> kernel 7 I9LG5I:CVE-2024-4418<
https://gitee.com/src-openeuler/libvirt/issues/I9LG5I
> libvirt 6.2 I9RFON:CVE-2023-52847<
https://gitee.com/src-openeuler/kernel/issues/I9RFON
> kernel 5.8 I9B08R:CVE-2022-1962<
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
> containers-common 5.5 I9L4ZX:CVE-2024-26976<
https://gitee.com/src-openeuler/kernel/issues/I9L4ZX
> kernel 5.5 I9L5DF:CVE-2024-26982<
https://gitee.com/src-openeuler/kernel/issues/I9L5DF
> kernel 5.5 I9L5GC:CVE-2024-26958<
https://gitee.com/src-openeuler/kernel/issues/I9L5GC
> kernel 5.5 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 5.5 I9L5JW:CVE-2024-26950<
https://gitee.com/src-openeuler/kernel/issues/I9L5JW
> kernel 5.5 I9L5M6:CVE-2024-26972<
https://gitee.com/src-openeuler/kernel/issues/I9L5M6
> kernel 5.5 I9L5N3:CVE-2024-26965<
https://gitee.com/src-openeuler/kernel/issues/I9L5N3
> kernel 5.5 I9L5OC:CVE-2024-26961<
https://gitee.com/src-openeuler/kernel/issues/I9L5OC
> kernel 5.5 I9L9IH:CVE-2024-27073<
https://gitee.com/src-openeuler/kernel/issues/I9L9IH
> kernel 5.5 I9L9IM:CVE-2024-27059<
https://gitee.com/src-openeuler/kernel/issues/I9L9IM
> kernel 5.5 I9L9J6:CVE-2024-27075<
https://gitee.com/src-openeuler/kernel/issues/I9L9J6
> kernel 5.5 I9L9JS:CVE-2024-27072<
https://gitee.com/src-openeuler/kernel/issues/I9L9JS
> kernel 5.5 I9L9LY:CVE-2024-27045<
https://gitee.com/src-openeuler/kernel/issues/I9L9LY
> kernel 5.5 I9P06W:CVE-2023-52656<
https://gitee.com/src-openeuler/kernel/issues/I9P06W
> kernel 5.5 I9Q8M4:CVE-2024-27407<
https://gitee.com/src-openeuler/kernel/issues/I9Q8M4
> kernel 5.5 I9Q8ZA:CVE-2024-35791<
https://gitee.com/src-openeuler/kernel/issues/I9Q8ZA
> kernel 5.5 I9Q919:CVE-2023-52664<
https://gitee.com/src-openeuler/kernel/issues/I9Q919
> kernel 5.5 I9Q939:CVE-2024-35818<
https://gitee.com/src-openeuler/kernel/issues/I9Q939
> kernel 5.5 I9Q94J:CVE-2024-27426<
https://gitee.com/src-openeuler/kernel/issues/I9Q94J
> kernel 5.5 I9Q95M:CVE-2024-27427<
https://gitee.com/src-openeuler/kernel/issues/I9Q95M
> kernel 5.5 I9Q9CC:CVE-2024-35805<
https://gitee.com/src-openeuler/kernel/issues/I9Q9CC
> kernel 5.5 I9Q9E2:CVE-2024-35845<
https://gitee.com/src-openeuler/kernel/issues/I9Q9E2
> kernel 5.5 I9Q9HZ:CVE-2023-52683<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HZ
> kernel 5.5 I9Q9I8:CVE-2024-35844<
https://gitee.com/src-openeuler/kernel/issues/I9Q9I8
> kernel 5.5 I9Q9IE:CVE-2024-35835<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IE
> kernel 5.5 I9Q9IT:CVE-2023-52698<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IT
> kernel 5.5 I9QG2A:CVE-2024-35898<
https://gitee.com/src-openeuler/kernel/issues/I9QG2A
> kernel 5.5 I9QGIW:CVE-2024-35922<
https://gitee.com/src-openeuler/kernel/issues/I9QGIW
> kernel 5.5 I9QGKD:CVE-2024-35940<
https://gitee.com/src-openeuler/kernel/issues/I9QGKD
> kernel 5.5 I9QGLA:CVE-2024-35930<
https://gitee.com/src-openeuler/kernel/issues/I9QGLA
> kernel 5.5 I9QRA8:CVE-2024-36006<
https://gitee.com/src-openeuler/kernel/issues/I9QRA8
> kernel 5.5 I9QRIQ:CVE-2024-35976<
https://gitee.com/src-openeuler/kernel/issues/I9QRIQ
> kernel 5.5 I9QRN6:CVE-2024-35997<
https://gitee.com/src-openeuler/kernel/issues/I9QRN6
> kernel 5.5 I9R4NB:CVE-2021-47421<
https://gitee.com/src-openeuler/kernel/issues/I9R4NB
> kernel 5.5 I9RBLZ:CVE-2021-47455<
https://gitee.com/src-openeuler/kernel/issues/I9RBLZ
> kernel 5.5 I9RE1F:CVE-2023-52835<
https://gitee.com/src-openeuler/kernel/issues/I9RE1F
> kernel 5.5 I9RE4X:CVE-2023-52817<
https://gitee.com/src-openeuler/kernel/issues/I9RE4X
> kernel 5.5 I9RFE5:CVE-2023-52840<
https://gitee.com/src-openeuler/kernel/issues/I9RFE5
> kernel 5.5 I9RFEA:CVE-2023-52813<
https://gitee.com/src-openeuler/kernel/issues/I9RFEA
> kernel 5.5 I9RFIR:CVE-2023-52844<
https://gitee.com/src-openeuler/kernel/issues/I9RFIR
> kernel 5.5 I9RFKZ:CVE-2023-52869<
https://gitee.com/src-openeuler/kernel/issues/I9RFKZ
> kernel 5.5 I9RFL5:CVE-2023-52860<
https://gitee.com/src-openeuler/kernel/issues/I9RFL5
> kernel 5.5 I9RFL9:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9RFL9
> kernel 5.5 I9RG0L:CVE-2023-52809<
https://gitee.com/src-openeuler/kernel/issues/I9RG0L
> kernel 5.5 I9RL31:CVE-2023-52863<
https://gitee.com/src-openeuler/kernel/issues/I9RL31
> kernel 5.5 I9RQM3:CVE-2023-52854<
https://gitee.com/src-openeuler/kernel/issues/I9RQM3
> kernel 5.5 I9RG0H:CVE-2023-52870<
https://gitee.com/src-openeuler/kernel/issues/I9RG0H
> kernel 5.5 I9L5JU:CVE-2024-27008<
https://gitee.com/src-openeuler/kernel/issues/I9L5JU
> kernel 5.3 I9Q94D:CVE-2024-27419<
https://gitee.com/src-openeuler/kernel/issues/I9Q94D
> kernel 5.3 I9L9IG:CVE-2024-27389<
https://gitee.com/src-openeuler/kernel/issues/I9L9IG
> kernel 4.7 I9RG0J:CVE-2023-52876<
https://gitee.com/src-openeuler/kernel/issues/I9RG0J
> kernel 4.7 I9E6TH:CVE-2024-26814<
https://gitee.com/src-openeuler/kernel/issues/I9E6TH
> kernel 4.4 I9L9OA:CVE-2023-52650<
https://gitee.com/src-openeuler/kernel/issues/I9L9OA
> kernel 4 I9HL48:CVE-2024-21012<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL48
> openjdk-17 3.7 I9HL4D:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL4D
> openjdk-17 3.7 I9H9UK:CVE-2024-21094<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
> openjdk-1.8.0 3.7 I9H9VN:CVE-2024-21085<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
> openjdk-1.8.0 3.7 I9H9U3:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
> openjdk-1.8.0 3.7 I9H9UI:CVE-2024-21011<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
> openjdk-1.8.0 3.7 I9L5H7:CVE-2024-27000<
https://gitee.com/src-openeuler/kernel/issues/I9L5H7
> kernel 3.3 I9Q9HJ:CVE-2023-52690<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HJ
> kernel 1 I9QGJZ:CVE-2024-35934<
https://gitee.com/src-openeuler/kernel/issues/I9QGJZ
> kernel 1 I9QGK1:CVE-2024-35938<
https://gitee.com/src-openeuler/kernel/issues/I9QGK1
> kernel 1 I9R4L9:CVE-2022-48708<
https://gitee.com/src-openeuler/kernel/issues/I9R4L9
> kernel 1 I9RE9O:CVE-2023-52841<
https://gitee.com/src-openeuler/kernel/issues/I9RE9O
> kernel 1 I9Q970:CVE-2024-35806<
https://gitee.com/src-openeuler/kernel/issues/I9Q970
> kernel 0 I9Q992:CVE-2024-35801<
https://gitee.com/src-openeuler/kernel/issues/I9Q992
> kernel 0 I9Q9F4:CVE-2024-35848<
https://gitee.com/src-openeuler/kernel/issues/I9Q9F4
> kernel 0 I9QGIP:CVE-2024-35936<
https://gitee.com/src-openeuler/kernel/issues/I9QGIP
> kernel 0 I9RFRB:CVE-2023-52837<
https://gitee.com/src-openeuler/kernel/issues/I9RFRB
> kernel 0 I9RG0I:CVE-2023-52879<
https://gitee.com/src-openeuler/kernel/issues/I9RG0I
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变: sendmail-redhat.mc编译时被改变 sendmail #I9R1JE:22.03-LTS系列分支未同步中文翻译补丁:22.03-LTS系列分支未同步中文翻译补丁 cockpit #I9EWLP:CVE-2023-37328修复咨询:CVE-2023-37328修复咨询 gstreamer1-plugins-base #I76JSK:[hulk5.10] xfs文件系统测试专项问题:[hulk5.10] xfs文件系统测试专项问题 kernel #I9DFT4:Backport 5.10.201 LTS patches from upstream:Backport 5.10.201 LTS patches from upstream kernel #I9RB5N:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators kernel #I9RQAS:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx kernel #I9RWXP:主线补丁回合:crypto: engine - fix crypto_queue backlog handling:主线补丁回合:crypto: engine - fix crypto_queue backlog handling kernel Hotpatch CVE 仓库 score CVE-2024-26883 kernel 7.8 openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP1 I6N49G 【openeuler-22.03-LTS-SP1】openeuler-22.03-LTS-SP1 x86默认不再编译bcache,导致bcache业务无法正常使用 任务 2023/3/14 20:13 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49G
2 openEuler-22.03-LTS-SP1 I6OLND 关闭kdump情况下触发panic可能会卡死 任务 2023/3/20 16:58 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6OLND
3 openEuler-22.03-LTS-SP1 I6ORVZ 【22.03-LTS-SP1】modprobe强制加载内核模块失败Key was rejected by service 任务 2023/3/21 10:52 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6ORVZ
4 openEuler-22.03-LTS-SP1 I6P3II [openEuler-22.03-LTS-SP1] arm 内核不支持files cgroup 任务 2023/3/22 10:20 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6P3II
5 openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 缺陷 2023/4/13 16:38 次要 src-openEuler/mariadb DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
6 openEuler-22.03-LTS-SP1 I6ZOUM qemu-6.2.0 内存预分配性能比 qemu-4.1.0有严重下降 任务 2023/4/28 17:37 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I6ZOUM
7 openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 缺陷 2023/5/16 9:01 次要 src-openEuler/php Base-service
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
8 openEuler-22.03-LTS-SP1 I73TNL 开启FIPS模式重启系统内核自检ofb(aes)算法失败导致panic 任务 2023/5/17 14:33 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I73TNL
9 openEuler-22.03-LTS-SP1 I7BM6U 【openEuler-22.03-LTS-SP1 】548子项异常波动问题跟踪 任务 2023/6/7 14:54 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7BM6U
10 openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 缺陷 2023/7/28 14:38 主要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
11 openEuler-22.03-LTS-SP1 I84L9F openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败 缺陷 2023/9/26 19:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
12 openEuler-22.03-LTS-SP1 I9CO8M 【openEuler-22.03-LTS-SP1】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:46 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CO8M
13 openEuler-22.03-LTS-SP1 I9K172 [22.03 LTS-SP1][deja] deja扫描类型用例执行部分失败 缺陷 2024/4/26 18:51 次要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K172
openEuler-22.03-LTS-SP2 Update 20240529 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题7个,已知漏洞71个,目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBUW?from=project-i…
CVE修复: CVE 仓库 score I4BYQY:CVE-2019-10174<
https://gitee.com/src-openeuler/infinispan/issues/I4BYQY
> infinispan 8.8 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I9F7I0:CVE-2024-20932<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
> openjdk-17 7.5 I9F7K6:CVE-2024-20918<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
> openjdk-17 7.4 I9NWCV:CVE-2024-3154<
https://gitee.com/src-openeuler/runc/issues/I9NWCV
> runc 7.2 I9JFG0:CVE-2024-26923<
https://gitee.com/src-openeuler/kernel/issues/I9JFG0
> kernel 7 I9GOTV:CVE-2024-3651<
https://gitee.com/src-openeuler/python-idna/issues/I9GOTV
> python-idna 6.5 I9LG5I:CVE-2024-4418<
https://gitee.com/src-openeuler/libvirt/issues/I9LG5I
> libvirt 6.2 I9E461:CVE-2024-26787<
https://gitee.com/src-openeuler/kernel/issues/I9E461
> kernel 5.5 I9E46O:CVE-2024-26801<
https://gitee.com/src-openeuler/kernel/issues/I9E46O
> kernel 5.5 I9HK8U:CVE-2024-26881<
https://gitee.com/src-openeuler/kernel/issues/I9HK8U
> kernel 5.5 I9L4ZX:CVE-2024-26976<
https://gitee.com/src-openeuler/kernel/issues/I9L4ZX
> kernel 5.5 I9L5DF:CVE-2024-26982<
https://gitee.com/src-openeuler/kernel/issues/I9L5DF
> kernel 5.5 I9L5GC:CVE-2024-26958<
https://gitee.com/src-openeuler/kernel/issues/I9L5GC
> kernel 5.5 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 5.5 I9L5JW:CVE-2024-26950<
https://gitee.com/src-openeuler/kernel/issues/I9L5JW
> kernel 5.5 I9L5N3:CVE-2024-26965<
https://gitee.com/src-openeuler/kernel/issues/I9L5N3
> kernel 5.5 I9L5OC:CVE-2024-26961<
https://gitee.com/src-openeuler/kernel/issues/I9L5OC
> kernel 5.5 I9L9IH:CVE-2024-27073<
https://gitee.com/src-openeuler/kernel/issues/I9L9IH
> kernel 5.5 I9L9IM:CVE-2024-27059<
https://gitee.com/src-openeuler/kernel/issues/I9L9IM
> kernel 5.5 I9L9J6:CVE-2024-27075<
https://gitee.com/src-openeuler/kernel/issues/I9L9J6
> kernel 5.5 I9L9LY:CVE-2024-27045<
https://gitee.com/src-openeuler/kernel/issues/I9L9LY
> kernel 5.5 I9P06W:CVE-2023-52656<
https://gitee.com/src-openeuler/kernel/issues/I9P06W
> kernel 5.5 I9Q8M4:CVE-2024-27407<
https://gitee.com/src-openeuler/kernel/issues/I9Q8M4
> kernel 5.5 I9Q8ZA:CVE-2024-35791<
https://gitee.com/src-openeuler/kernel/issues/I9Q8ZA
> kernel 5.5 I9Q919:CVE-2023-52664<
https://gitee.com/src-openeuler/kernel/issues/I9Q919
> kernel 5.5 I9Q939:CVE-2024-35818<
https://gitee.com/src-openeuler/kernel/issues/I9Q939
> kernel 5.5 I9Q94J:CVE-2024-27426<
https://gitee.com/src-openeuler/kernel/issues/I9Q94J
> kernel 5.5 I9Q95M:CVE-2024-27427<
https://gitee.com/src-openeuler/kernel/issues/I9Q95M
> kernel 5.5 I9Q9CC:CVE-2024-35805<
https://gitee.com/src-openeuler/kernel/issues/I9Q9CC
> kernel 5.5 I9Q9HZ:CVE-2023-52683<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HZ
> kernel 5.5 I9Q9I8:CVE-2024-35844<
https://gitee.com/src-openeuler/kernel/issues/I9Q9I8
> kernel 5.5 I9Q9IE:CVE-2024-35835<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IE
> kernel 5.5 I9Q9IT:CVE-2023-52698<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IT
> kernel 5.5 I9QG2A:CVE-2024-35898<
https://gitee.com/src-openeuler/kernel/issues/I9QG2A
> kernel 5.5 I9QGIW:CVE-2024-35922<
https://gitee.com/src-openeuler/kernel/issues/I9QGIW
> kernel 5.5 I9QGKD:CVE-2024-35940<
https://gitee.com/src-openeuler/kernel/issues/I9QGKD
> kernel 5.5 I9QGLA:CVE-2024-35930<
https://gitee.com/src-openeuler/kernel/issues/I9QGLA
> kernel 5.5 I9QRA8:CVE-2024-36006<
https://gitee.com/src-openeuler/kernel/issues/I9QRA8
> kernel 5.5 I9QRIQ:CVE-2024-35976<
https://gitee.com/src-openeuler/kernel/issues/I9QRIQ
> kernel 5.5 I9QRN6:CVE-2024-35997<
https://gitee.com/src-openeuler/kernel/issues/I9QRN6
> kernel 5.5 I9R4NB:CVE-2021-47421<
https://gitee.com/src-openeuler/kernel/issues/I9R4NB
> kernel 5.5 I9RBLZ:CVE-2021-47455<
https://gitee.com/src-openeuler/kernel/issues/I9RBLZ
> kernel 5.5 I9RE1F:CVE-2023-52835<
https://gitee.com/src-openeuler/kernel/issues/I9RE1F
> kernel 5.5 I9RE4X:CVE-2023-52817<
https://gitee.com/src-openeuler/kernel/issues/I9RE4X
> kernel 5.5 I9RFEA:CVE-2023-52813<
https://gitee.com/src-openeuler/kernel/issues/I9RFEA
> kernel 5.5 I9RFIR:CVE-2023-52844<
https://gitee.com/src-openeuler/kernel/issues/I9RFIR
> kernel 5.5 I9RFL5:CVE-2023-52860<
https://gitee.com/src-openeuler/kernel/issues/I9RFL5
> kernel 5.5 I9RFL9:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9RFL9
> kernel 5.5 I9Q9E2:CVE-2024-35845<
https://gitee.com/src-openeuler/kernel/issues/I9Q9E2
> kernel 5.5 I9L5JU:CVE-2024-27008<
https://gitee.com/src-openeuler/kernel/issues/I9L5JU
> kernel 5.3 I9Q94D:CVE-2024-27419<
https://gitee.com/src-openeuler/kernel/issues/I9Q94D
> kernel 5.3 I9G0JY:CVE-2024-3096<
https://gitee.com/src-openeuler/php/issues/I9G0JY
> php 4.8 I9L9IG:CVE-2024-27389<
https://gitee.com/src-openeuler/kernel/issues/I9L9IG
> kernel 4.7 I9E6TH:CVE-2024-26814<
https://gitee.com/src-openeuler/kernel/issues/I9E6TH
> kernel 4.4 I9L9OA:CVE-2023-52650<
https://gitee.com/src-openeuler/kernel/issues/I9L9OA
> kernel 4 I9HL48:CVE-2024-21012<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL48
> openjdk-17 3.7 I9HL4D:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL4D
> openjdk-17 3.7 I9H9UK:CVE-2024-21094<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
> openjdk-1.8.0 3.7 I9H9VN:CVE-2024-21085<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
> openjdk-1.8.0 3.7 I9H9U3:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
> openjdk-1.8.0 3.7 I9H9UI:CVE-2024-21011<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
> openjdk-1.8.0 3.7 I9L5H7:CVE-2024-27000<
https://gitee.com/src-openeuler/kernel/issues/I9L5H7
> kernel 3.3 I9Q9HJ:CVE-2023-52690<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HJ
> kernel 1 I9QGJZ:CVE-2024-35934<
https://gitee.com/src-openeuler/kernel/issues/I9QGJZ
> kernel 1 I9QGK1:CVE-2024-35938<
https://gitee.com/src-openeuler/kernel/issues/I9QGK1
> kernel 1 I9Q970:CVE-2024-35806<
https://gitee.com/src-openeuler/kernel/issues/I9Q970
> kernel 0 I9Q992:CVE-2024-35801<
https://gitee.com/src-openeuler/kernel/issues/I9Q992
> kernel 0 I9QGIP:CVE-2024-35936<
https://gitee.com/src-openeuler/kernel/issues/I9QGIP
> kernel 0 I9RFRB:CVE-2023-52837<
https://gitee.com/src-openeuler/kernel/issues/I9RFRB
> kernel 0 I9RG0I:CVE-2023-52879<
https://gitee.com/src-openeuler/kernel/issues/I9RG0I
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变: sendmail-redhat.mc编译时被改变 sendmail #I9R1JE:22.03-LTS系列分支未同步中文翻译补丁:22.03-LTS系列分支未同步中文翻译补丁 cockpit #I9EWLP:CVE-2023-37328修复咨询:CVE-2023-37328修复咨询 gstreamer1-plugins-base #I76JSK:[hulk5.10] xfs文件系统测试专项问题:[hulk5.10] xfs文件系统测试专项问题 kernel #I9DFT4:Backport 5.10.201 LTS patches from upstream:Backport 5.10.201 LTS patches from upstream kernel #I9RB5N:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators kernel #I9RQAS:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx kernel Hotpatch CVE 仓库 score CVE-2024-26883 kernel 7.8 CVE-2024-26884 kernel 7.8 openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 缺陷 2023/5/29 15:50 主要 src-openEuler/skopeo sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I795G3
2 openEuler-22.03-LTS-SP2 I7AAWF 2203-SP2下安装虚拟机,CPU为FT-2000+,使用host-model启动虚拟机失败 任务 2023/6/2 10:46 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7AAWF
3 openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 缺陷 2023/6/2 16:14 主要 src-openEuler/libkae sig-AccLib
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
4 openEuler-22.03-LTS-SP2 I7B6X5 gcc-pie-arm64架构和操作手册结果不同 缺陷 2023/6/6 10:11 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
5 openEuler-22.03-LTS-SP2 I7BRC1 perf 与 libtraceevent 软件包存在安装冲突 任务 2023/6/7 20:42 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I7BRC1
6 openEuler-22.03-LTS-SP2-update20231018 I89NB0 22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本 缺陷 2023/10/20 15:35 次要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
7 openEuler-22.03-LTS-SP2 I8C74L 实时补丁版本选择 任务 2023/10/31 9:53 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8C74L
8 openEuler-22.03-LTS-SP2 I9CODR 【openEuler-22.03-LTS-SP2】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:53 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CODR
openEuler-20.03-LTS-SP4 Update 20240529 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题8个,已知漏洞97个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBV5?from=project-i…
CVE修复: CVE 仓库 score I4BYQY:CVE-2019-10174<
https://gitee.com/src-openeuler/infinispan/issues/I4BYQY
> infinispan 8.8 I9RCTY:CVE-2021-29946<
https://gitee.com/src-openeuler/mozjs78/issues/I9RCTY
> mozjs78 8.8 I9F7I0:CVE-2024-20932<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
> openjdk-17 7.5 I9F7K6:CVE-2024-20918<
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
> openjdk-17 7.4 I9QRRC:CVE-2024-35950<
https://gitee.com/src-openeuler/kernel/issues/I9QRRC
> kernel 7 I9L9O3:CVE-2024-27051<
https://gitee.com/src-openeuler/kernel/issues/I9L9O3
> kernel 6.6 I9L9O8:CVE-2024-27028<
https://gitee.com/src-openeuler/kernel/issues/I9L9O8
> kernel 6.6 I9RFET:CVE-2023-52818<
https://gitee.com/src-openeuler/kernel/issues/I9RFET
> kernel 6.6 I9LKE0:CVE-2022-48697<
https://gitee.com/src-openeuler/kernel/issues/I9LKE0
> kernel 6.5 I9L5KV:CVE-2024-26996<
https://gitee.com/src-openeuler/kernel/issues/I9L5KV
> kernel 6.4 I9RLZ0:CVE-2021-47335<
https://gitee.com/src-openeuler/kernel/issues/I9RLZ0
> kernel 6.4 I9LG5I:CVE-2024-4418<
https://gitee.com/src-openeuler/libvirt/issues/I9LG5I
> libvirt 6.2 I9L5LW:CVE-2024-26974<
https://gitee.com/src-openeuler/kernel/issues/I9L5LW
> kernel 5.8 I9RFON:CVE-2023-52847<
https://gitee.com/src-openeuler/kernel/issues/I9RFON
> kernel 5.8 I9L4RJ:CVE-2024-26960<
https://gitee.com/src-openeuler/kernel/issues/I9L4RJ
> kernel 5.5 I9L4ZX:CVE-2024-26976<
https://gitee.com/src-openeuler/kernel/issues/I9L4ZX
> kernel 5.5 I9L5A8:CVE-2024-27001<
https://gitee.com/src-openeuler/kernel/issues/I9L5A8
> kernel 5.5 I9L5DF:CVE-2024-26982<
https://gitee.com/src-openeuler/kernel/issues/I9L5DF
> kernel 5.5 I9L5DI:CVE-2024-26955<
https://gitee.com/src-openeuler/kernel/issues/I9L5DI
> kernel 5.5 I9L5G5:CVE-2024-26966<
https://gitee.com/src-openeuler/kernel/issues/I9L5G5
> kernel 5.5 I9L5GC:CVE-2024-26958<
https://gitee.com/src-openeuler/kernel/issues/I9L5GC
> kernel 5.5 I9L5GD:CVE-2024-26981<
https://gitee.com/src-openeuler/kernel/issues/I9L5GD
> kernel 5.5 I9L5IO:CVE-2024-27010<
https://gitee.com/src-openeuler/kernel/issues/I9L5IO
> kernel 5.5 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 5.5 I9L5JJ:CVE-2024-26956<
https://gitee.com/src-openeuler/kernel/issues/I9L5JJ
> kernel 5.5 I9L5JZ:CVE-2024-26969<
https://gitee.com/src-openeuler/kernel/issues/I9L5JZ
> kernel 5.5 I9L5KR:CVE-2024-26999<
https://gitee.com/src-openeuler/kernel/issues/I9L5KR
> kernel 5.5 I9L5L5:CVE-2024-26994<
https://gitee.com/src-openeuler/kernel/issues/I9L5L5
> kernel 5.5 I9L5N3:CVE-2024-26965<
https://gitee.com/src-openeuler/kernel/issues/I9L5N3
> kernel 5.5 I9L5OC:CVE-2024-26961<
https://gitee.com/src-openeuler/kernel/issues/I9L5OC
> kernel 5.5 I9L5OD:CVE-2024-27011<
https://gitee.com/src-openeuler/kernel/issues/I9L5OD
> kernel 5.5 I9L9IH:CVE-2024-27073<
https://gitee.com/src-openeuler/kernel/issues/I9L9IH
> kernel 5.5 I9L9IM:CVE-2024-27059<
https://gitee.com/src-openeuler/kernel/issues/I9L9IM
> kernel 5.5 I9L9IX:CVE-2024-27062<
https://gitee.com/src-openeuler/kernel/issues/I9L9IX
> kernel 5.5 I9L9J1:CVE-2024-27388<
https://gitee.com/src-openeuler/kernel/issues/I9L9J1
> kernel 5.5 I9L9J6:CVE-2024-27075<
https://gitee.com/src-openeuler/kernel/issues/I9L9J6
> kernel 5.5 I9L9JK:CVE-2024-27077<
https://gitee.com/src-openeuler/kernel/issues/I9L9JK
> kernel 5.5 I9L9JS:CVE-2024-27072<
https://gitee.com/src-openeuler/kernel/issues/I9L9JS
> kernel 5.5 I9L9NB:CVE-2024-27037<
https://gitee.com/src-openeuler/kernel/issues/I9L9NB
> kernel 5.5 I9L9NF:CVE-2024-27054<
https://gitee.com/src-openeuler/kernel/issues/I9L9NF
> kernel 5.5 I9L9NT:CVE-2024-27046<
https://gitee.com/src-openeuler/kernel/issues/I9L9NT
> kernel 5.5 I9LKDS:CVE-2022-48704<
https://gitee.com/src-openeuler/kernel/issues/I9LKDS
> kernel 5.5 I9LKDT:CVE-2022-48695<
https://gitee.com/src-openeuler/kernel/issues/I9LKDT
> kernel 5.5 I9P06W:CVE-2023-52656<
https://gitee.com/src-openeuler/kernel/issues/I9P06W
> kernel 5.5 I9Q8LQ:CVE-2024-27403<
https://gitee.com/src-openeuler/kernel/issues/I9Q8LQ
> kernel 5.5 I9Q91I:CVE-2024-27428<
https://gitee.com/src-openeuler/kernel/issues/I9Q91I
> kernel 5.5 I9Q94J:CVE-2024-27426<
https://gitee.com/src-openeuler/kernel/issues/I9Q94J
> kernel 5.5 I9Q95M:CVE-2024-27427<
https://gitee.com/src-openeuler/kernel/issues/I9Q95M
> kernel 5.5 I9Q99Q:CVE-2024-35815<
https://gitee.com/src-openeuler/kernel/issues/I9Q99Q
> kernel 5.5 I9Q9CC:CVE-2024-35805<
https://gitee.com/src-openeuler/kernel/issues/I9Q9CC
> kernel 5.5 I9Q9FV:CVE-2023-52685<
https://gitee.com/src-openeuler/kernel/issues/I9Q9FV
> kernel 5.5 I9Q9HO:CVE-2024-35849<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HO
> kernel 5.5 I9Q9HZ:CVE-2023-52683<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HZ
> kernel 5.5 I9Q9IE:CVE-2024-35835<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IE
> kernel 5.5 I9Q9IT:CVE-2023-52698<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IT
> kernel 5.5 I9QG2A:CVE-2024-35898<
https://gitee.com/src-openeuler/kernel/issues/I9QG2A
> kernel 5.5 I9QG76:CVE-2024-35886<
https://gitee.com/src-openeuler/kernel/issues/I9QG76
> kernel 5.5 I9QGIW:CVE-2024-35922<
https://gitee.com/src-openeuler/kernel/issues/I9QGIW
> kernel 5.5 I9QGLA:CVE-2024-35930<
https://gitee.com/src-openeuler/kernel/issues/I9QGLA
> kernel 5.5 I9QRIQ:CVE-2024-35976<
https://gitee.com/src-openeuler/kernel/issues/I9QRIQ
> kernel 5.5 I9QRN6:CVE-2024-35997<
https://gitee.com/src-openeuler/kernel/issues/I9QRN6
> kernel 5.5 I9R4K2:CVE-2021-47284<
https://gitee.com/src-openeuler/kernel/issues/I9R4K2
> kernel 5.5 I9R4KL:CVE-2022-48710<
https://gitee.com/src-openeuler/kernel/issues/I9R4KL
> kernel 5.5 I9RBLZ:CVE-2021-47455<
https://gitee.com/src-openeuler/kernel/issues/I9RBLZ
> kernel 5.5 I9RD7J:CVE-2021-47497<
https://gitee.com/src-openeuler/kernel/issues/I9RD7J
> kernel 5.5 I9RE1F:CVE-2023-52835<
https://gitee.com/src-openeuler/kernel/issues/I9RE1F
> kernel 5.5 I9RE4X:CVE-2023-52817<
https://gitee.com/src-openeuler/kernel/issues/I9RE4X
> kernel 5.5 I9RFE5:CVE-2023-52840<
https://gitee.com/src-openeuler/kernel/issues/I9RFE5
> kernel 5.5 I9RFK5:CVE-2023-52868<
https://gitee.com/src-openeuler/kernel/issues/I9RFK5
> kernel 5.5 I9RFL9:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9RFL9
> kernel 5.5 I9LKE1:CVE-2022-48702<
https://gitee.com/src-openeuler/kernel/issues/I9LKE1
> kernel 5.4 I9L5JU:CVE-2024-27008<
https://gitee.com/src-openeuler/kernel/issues/I9L5JU
> kernel 5.3 I9Q94D:CVE-2024-27419<
https://gitee.com/src-openeuler/kernel/issues/I9Q94D
> kernel 5.3 I9G0JY:CVE-2024-3096<
https://gitee.com/src-openeuler/php/issues/I9G0JY
> php 4.8 I9L4T8:CVE-2024-26957<
https://gitee.com/src-openeuler/kernel/issues/I9L4T8
> kernel 4 I9L9JG:CVE-2024-27078<
https://gitee.com/src-openeuler/kernel/issues/I9L9JG
> kernel 4 I9L9M2:CVE-2024-27024<
https://gitee.com/src-openeuler/kernel/issues/I9L9M2
> kernel 4 I9L9OA:CVE-2023-52650<
https://gitee.com/src-openeuler/kernel/issues/I9L9OA
> kernel 4 I9HL48:CVE-2024-21012<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL48
> openjdk-17 3.7 I9HL4D:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-17/issues/I9HL4D
> openjdk-17 3.7 I9H9UK:CVE-2024-21094<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
> openjdk-1.8.0 3.7 I9H9VN:CVE-2024-21085<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
> openjdk-1.8.0 3.7 I9H9U3:CVE-2024-21068<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
> openjdk-1.8.0 3.7 I9H9UI:CVE-2024-21011<
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
> openjdk-1.8.0 3.7 I9L5H7:CVE-2024-27000<
https://gitee.com/src-openeuler/kernel/issues/I9L5H7
> kernel 3.3 I9L9IF:CVE-2023-52653<
https://gitee.com/src-openeuler/kernel/issues/I9L9IF
> kernel 3.3 I9L9IV:CVE-2023-52652<
https://gitee.com/src-openeuler/kernel/issues/I9L9IV
> kernel 3.3 I9Q9HX:CVE-2024-35847<
https://gitee.com/src-openeuler/kernel/issues/I9Q9HX
> kernel 1 I9QGIK:CVE-2024-35935<
https://gitee.com/src-openeuler/kernel/issues/I9QGIK
> kernel 1 I9R7JN:CVE-2023-52867<
https://gitee.com/src-openeuler/kernel/issues/I9R7JN
> kernel 1 I9RCYN:CVE-2021-47496<
https://gitee.com/src-openeuler/kernel/issues/I9RCYN
> kernel 1 I9Q970:CVE-2024-35806<
https://gitee.com/src-openeuler/kernel/issues/I9Q970
> kernel 0 I9Q9IJ:CVE-2023-52691<
https://gitee.com/src-openeuler/kernel/issues/I9Q9IJ
> kernel 0 I9QGIP:CVE-2024-35936<
https://gitee.com/src-openeuler/kernel/issues/I9QGIP
> kernel 0 I9R4C8:CVE-2021-47269<
https://gitee.com/src-openeuler/kernel/issues/I9R4C8
> kernel 0 I9R4O0:CVE-2021-47393<
https://gitee.com/src-openeuler/kernel/issues/I9R4O0
> kernel 0 I9RB0N:CVE-2021-47473<
https://gitee.com/src-openeuler/kernel/issues/I9RB0N
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变: sendmail-redhat.mc编译时被改变 sendmail #I9RNFF:[20.03-sp4] mpstat误报高iowait问题:[20.03-sp4] mpstat误报高iowait问题 sysstat #I9EWLP:CVE-2023-37328修复咨询:CVE-2023-37328修复咨询 gstreamer1-plugins-base #I9NZ3E:【OLK-5.10】 5月主线补丁分析回合:【OLK-5.10】 5月主线补丁分析回合 kernel #I9PGWG:scsi sr驱动存在信息泄露问题:scsi sr驱动存在信息泄露问题 kernel #I9PX8J:回合主线补丁ip: Treat IPv4 segment's lowest address as unicast:回合主线补丁ip: Treat IPv4 segment's lowest address as unicast kernel #I9RDP6:CVE-2023-52840:CVE-2023-52840 kernel #I9RZC8:[PATCH] sched/rt: Fix rt_runtime leaks with cpu hotplug and RT_RUNTIME_SHARE:[PATCH] sched/rt: Fix rt_runtime leaks with cpu hotplug and RT_RUNTIME_SHARE kernel openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-20.03-LTS-SP4-alpha I8B7XU 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 缺陷 2023/10/26 19:02 主要 src-openEuler/vdsm oVirt
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
2 openEuler-20.03-LTS-SP4-round-1 I8DT5M 【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败 缺陷 2023/11/4 17:34 主要 src-openEuler/redis6 bigdata
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
3 openEuler-20.03-LTS-SP4 release I8EAHA [20.03-lts-sp4]Support handle CXL devices AER errors in firmware-first mode 任务 2023/11/6 22:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8EAHA
4 openEuler-20.03-LTS-SP4-round-1 I8EKUI 【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败 缺陷 2023/11/7 17:23 主要 src-openEuler/strongswan sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
5 openEuler-20.03-LTS-SP4 release I8F7ZR [20.03-lts-sp4]The Hisi SAS driver supports the MQ feature 任务 2023/11/9 17:03 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F7ZR
6 openEuler-20.03-LTS-SP4 release I8F80L [20.03-lts-sp4]The Hisi SAS driver supports loopback bit stream 任务 2023/11/9 17:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F80L
7 openEuler-20.03-LTS-SP4-round-2 I8G371 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 缺陷 2023/11/13 16:59 次要 src-openEuler/h2 DB
https://gitee.com/open_euler/dashboard?issue_id=I8G371
8 openEuler-20.03-LTS-SP4-round-2 I8GDGR 【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住 缺陷 2023/11/14 15:36 主要 src-openEuler/gnome-desktop3 GNOME
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
9 openEuler-20.03-LTS-SP4-dailybuild I8GUMP [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything 缺陷 2023/11/16 9:18 不重要 src-openEuler/nagios-plugins Networking
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
10 openEuler-20.03-LTS-SP4-dailybuild I8I8DQ [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol 缺陷 2023/11/21 15:31 不重要 src-openEuler/caja-extensions sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240529 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题21个,已知漏洞102个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9SBMY?from=project-i…
CVE修复: CVE 仓库 score #I4BYQY:CVE-2019-10174<
https://gitee.com/open_euler/dashboard?issue_id=I4BYQY
> infinispan 8.8 #I9Q94F:CVE-2024-35817<
https://gitee.com/open_euler/dashboard?issue_id=I9Q94F
> kernel 7.8 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I9F7I0:CVE-2024-20932<
https://gitee.com/open_euler/dashboard?issue_id=I9F7I0
> openjdk-17 7.5 #I9F7K6:CVE-2024-20918<
https://gitee.com/open_euler/dashboard?issue_id=I9F7K6
> openjdk-17 7.4 #I9NWCV:CVE-2024-3154<
https://gitee.com/open_euler/dashboard?issue_id=I9NWCV
> runc 7.2 #I9RFHD:CVE-2023-52846<
https://gitee.com/open_euler/dashboard?issue_id=I9RFHD
> kernel 7 #I9RFET:CVE-2023-52818<
https://gitee.com/open_euler/dashboard?issue_id=I9RFET
> kernel 6.6 #I9LG5I:CVE-2024-4418<
https://gitee.com/open_euler/dashboard?issue_id=I9LG5I
> libvirt 6.2 #I9RFON:CVE-2023-52847<
https://gitee.com/open_euler/dashboard?issue_id=I9RFON
> kernel 5.8 #I9RG2R:CVE-2023-52858<
https://gitee.com/open_euler/dashboard?issue_id=I9RG2R
> kernel 5.7 #I9KHKJ:CVE-2022-48645<
https://gitee.com/open_euler/dashboard?issue_id=I9KHKJ
> kernel 5.5 #I9L4ZX:CVE-2024-26976<
https://gitee.com/open_euler/dashboard?issue_id=I9L4ZX
> kernel 5.5 #I9L5DF:CVE-2024-26982<
https://gitee.com/open_euler/dashboard?issue_id=I9L5DF
> kernel 5.5 #I9L5DI:CVE-2024-26955<
https://gitee.com/open_euler/dashboard?issue_id=I9L5DI
> kernel 5.5 #I9L5GC:CVE-2024-26958<
https://gitee.com/open_euler/dashboard?issue_id=I9L5GC
> kernel 5.5 #I9L5IO:CVE-2024-27010<
https://gitee.com/open_euler/dashboard?issue_id=I9L5IO
> kernel 5.5 #I9L5IQ:CVE-2024-26993<
https://gitee.com/open_euler/dashboard?issue_id=I9L5IQ
> kernel 5.5 #I9L5JW:CVE-2024-26950<
https://gitee.com/open_euler/dashboard?issue_id=I9L5JW
> kernel 5.5 #I9L5KR:CVE-2024-26999<
https://gitee.com/open_euler/dashboard?issue_id=I9L5KR
> kernel 5.5 #I9L5L5:CVE-2024-26994<
https://gitee.com/open_euler/dashboard?issue_id=I9L5L5
> kernel 5.5 #I9L5M6:CVE-2024-26972<
https://gitee.com/open_euler/dashboard?issue_id=I9L5M6
> kernel 5.5 #I9L5N3:CVE-2024-26965<
https://gitee.com/open_euler/dashboard?issue_id=I9L5N3
> kernel 5.5 #I9L5OC:CVE-2024-26961<
https://gitee.com/open_euler/dashboard?issue_id=I9L5OC
> kernel 5.5 #I9L5OD:CVE-2024-27011<
https://gitee.com/open_euler/dashboard?issue_id=I9L5OD
> kernel 5.5 #I9L9IH:CVE-2024-27073<
https://gitee.com/open_euler/dashboard?issue_id=I9L9IH
> kernel 5.5 #I9L9IM:CVE-2024-27059<
https://gitee.com/open_euler/dashboard?issue_id=I9L9IM
> kernel 5.5 #I9L9J1:CVE-2024-27388<
https://gitee.com/open_euler/dashboard?issue_id=I9L9J1
> kernel 5.5 #I9L9J6:CVE-2024-27075<
https://gitee.com/open_euler/dashboard?issue_id=I9L9J6
> kernel 5.5 #I9L9JS:CVE-2024-27072<
https://gitee.com/open_euler/dashboard?issue_id=I9L9JS
> kernel 5.5 #I9L9LY:CVE-2024-27045<
https://gitee.com/open_euler/dashboard?issue_id=I9L9LY
> kernel 5.5 #I9L9NB:CVE-2024-27037<
https://gitee.com/open_euler/dashboard?issue_id=I9L9NB
> kernel 5.5 #I9L9NO:CVE-2024-27034<
https://gitee.com/open_euler/dashboard?issue_id=I9L9NO
> kernel 5.5 #I9L9OE:CVE-2024-27035<
https://gitee.com/open_euler/dashboard?issue_id=I9L9OE
> kernel 5.5 #I9P06W:CVE-2023-52656<
https://gitee.com/open_euler/dashboard?issue_id=I9P06W
> kernel 5.5 #I9Q8LQ:CVE-2024-27403<
https://gitee.com/open_euler/dashboard?issue_id=I9Q8LQ
> kernel 5.5 #I9Q8M4:CVE-2024-27407<
https://gitee.com/open_euler/dashboard?issue_id=I9Q8M4
> kernel 5.5 #I9Q919:CVE-2023-52664<
https://gitee.com/open_euler/dashboard?issue_id=I9Q919
> kernel 5.5 #I9Q91I:CVE-2024-27428<
https://gitee.com/open_euler/dashboard?issue_id=I9Q91I
> kernel 5.5 #I9Q939:CVE-2024-35818<
https://gitee.com/open_euler/dashboard?issue_id=I9Q939
> kernel 5.5 #I9Q94J:CVE-2024-27426<
https://gitee.com/open_euler/dashboard?issue_id=I9Q94J
> kernel 5.5 #I9Q95M:CVE-2024-27427<
https://gitee.com/open_euler/dashboard?issue_id=I9Q95M
> kernel 5.5 #I9Q99Q:CVE-2024-35815<
https://gitee.com/open_euler/dashboard?issue_id=I9Q99Q
> kernel 5.5 #I9Q9CC:CVE-2024-35805<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9CC
> kernel 5.5 #I9Q9CH:CVE-2024-35839<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9CH
> kernel 5.5 #I9Q9HZ:CVE-2023-52683<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9HZ
> kernel 5.5 #I9Q9I8:CVE-2024-35844<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9I8
> kernel 5.5 #I9Q9IE:CVE-2024-35835<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9IE
> kernel 5.5 #I9Q9IT:CVE-2023-52698<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9IT
> kernel 5.5 #I9QG2A:CVE-2024-35898<
https://gitee.com/open_euler/dashboard?issue_id=I9QG2A
> kernel 5.5 #I9QG76:CVE-2024-35886<
https://gitee.com/open_euler/dashboard?issue_id=I9QG76
> kernel 5.5 #I9QG9F:CVE-2024-35897<
https://gitee.com/open_euler/dashboard?issue_id=I9QG9F
> kernel 5.5 #I9QGIW:CVE-2024-35922<
https://gitee.com/open_euler/dashboard?issue_id=I9QGIW
> kernel 5.5 #I9QGKD:CVE-2024-35940<
https://gitee.com/open_euler/dashboard?issue_id=I9QGKD
> kernel 5.5 #I9QGLA:CVE-2024-35930<
https://gitee.com/open_euler/dashboard?issue_id=I9QGLA
> kernel 5.5 #I9QRA8:CVE-2024-36006<
https://gitee.com/open_euler/dashboard?issue_id=I9QRA8
> kernel 5.5 #I9QRDG:CVE-2024-36008<
https://gitee.com/open_euler/dashboard?issue_id=I9QRDG
> kernel 5.5 #I9QRIQ:CVE-2024-35976<
https://gitee.com/open_euler/dashboard?issue_id=I9QRIQ
> kernel 5.5 #I9QRN6:CVE-2024-35997<
https://gitee.com/open_euler/dashboard?issue_id=I9QRN6
> kernel 5.5 #I9R4NB:CVE-2021-47421<
https://gitee.com/open_euler/dashboard?issue_id=I9R4NB
> kernel 5.5 #I9RBLZ:CVE-2021-47455<
https://gitee.com/open_euler/dashboard?issue_id=I9RBLZ
> kernel 5.5 #I9RE1F:CVE-2023-52835<
https://gitee.com/open_euler/dashboard?issue_id=I9RE1F
> kernel 5.5 #I9RE4X:CVE-2023-52817<
https://gitee.com/open_euler/dashboard?issue_id=I9RE4X
> kernel 5.5 #I9RFB7:CVE-2023-52845<
https://gitee.com/open_euler/dashboard?issue_id=I9RFB7
> kernel 5.5 #I9RFE5:CVE-2023-52840<
https://gitee.com/open_euler/dashboard?issue_id=I9RFE5
> kernel 5.5 #I9RFIR:CVE-2023-52844<
https://gitee.com/open_euler/dashboard?issue_id=I9RFIR
> kernel 5.5 #I9RFK5:CVE-2023-52868<
https://gitee.com/open_euler/dashboard?issue_id=I9RFK5
> kernel 5.5 #I9RFKZ:CVE-2023-52869<
https://gitee.com/open_euler/dashboard?issue_id=I9RFKZ
> kernel 5.5 #I9RFL9:CVE-2023-52867<
https://gitee.com/open_euler/dashboard?issue_id=I9RFL9
> kernel 5.5 #I9RG0L:CVE-2023-52809<
https://gitee.com/open_euler/dashboard?issue_id=I9RG0L
> kernel 5.5 #I9RL31:CVE-2023-52863<
https://gitee.com/open_euler/dashboard?issue_id=I9RL31
> kernel 5.5 #I9RQM3:CVE-2023-52854<
https://gitee.com/open_euler/dashboard?issue_id=I9RQM3
> kernel 5.5 #I9HK0R:CVE-2024-26886<
https://gitee.com/open_euler/dashboard?issue_id=I9HK0R
> kernel 5.5 #I9B08R:CVE-2022-1962<
https://gitee.com/open_euler/dashboard?issue_id=I9B08R
> containers-common 5.5 #I9L5JU:CVE-2024-27008<
https://gitee.com/open_euler/dashboard?issue_id=I9L5JU
> kernel 5.3 #I9Q94D:CVE-2024-27419<
https://gitee.com/open_euler/dashboard?issue_id=I9Q94D
> kernel 5.3 #I9AK7L:CVE-2024-26643<
https://gitee.com/open_euler/dashboard?issue_id=I9AK7L
> kernel 4.7 #I9L9IG:CVE-2024-27389<
https://gitee.com/open_euler/dashboard?issue_id=I9L9IG
> kernel 4.7 #I9RG0J:CVE-2023-52876<
https://gitee.com/open_euler/dashboard?issue_id=I9RG0J
> kernel 4.7 #I9L4T8:CVE-2024-26957<
https://gitee.com/open_euler/dashboard?issue_id=I9L4T8
> kernel 4 #I9L9M2:CVE-2024-27024<
https://gitee.com/open_euler/dashboard?issue_id=I9L9M2
> kernel 4 #I9L9OA:CVE-2023-52650<
https://gitee.com/open_euler/dashboard?issue_id=I9L9OA
> kernel 4 #I9HL48:CVE-2024-21012<
https://gitee.com/open_euler/dashboard?issue_id=I9HL48
> openjdk-17 3.7 #I9HL4D:CVE-2024-21068<
https://gitee.com/open_euler/dashboard?issue_id=I9HL4D
> openjdk-17 3.7 #I9H9UK:CVE-2024-21094<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UK
> openjdk-1.8.0 3.7 #I9H9VN:CVE-2024-21085<
https://gitee.com/open_euler/dashboard?issue_id=I9H9VN
> openjdk-1.8.0 3.7 #I9H9U3:CVE-2024-21068<
https://gitee.com/open_euler/dashboard?issue_id=I9H9U3
> openjdk-1.8.0 3.7 #I9H9UI:CVE-2024-21011<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UI
> openjdk-1.8.0 3.7 #I9L5H7:CVE-2024-27000<
https://gitee.com/open_euler/dashboard?issue_id=I9L5H7
> kernel 3.3 #I9L9IF:CVE-2023-52653<
https://gitee.com/open_euler/dashboard?issue_id=I9L9IF
> kernel 3.3 #I9L9IV:CVE-2023-52652<
https://gitee.com/open_euler/dashboard?issue_id=I9L9IV
> kernel 3.3 #I9Q9I6:CVE-2023-52682<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9I6
> kernel 1 #I9QGK1:CVE-2024-35938<
https://gitee.com/open_euler/dashboard?issue_id=I9QGK1
> kernel 1 #I9QRD6:CVE-2024-35995<
https://gitee.com/open_euler/dashboard?issue_id=I9QRD6
> kernel 1 #I9Q970:CVE-2024-35806<
https://gitee.com/open_euler/dashboard?issue_id=I9Q970
> kernel 0 #I9Q992:CVE-2024-35801<
https://gitee.com/open_euler/dashboard?issue_id=I9Q992
> kernel 0 #I9Q9F4:CVE-2024-35848<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9F4
> kernel 0 #I9Q9ID:CVE-2023-52674<
https://gitee.com/open_euler/dashboard?issue_id=I9Q9ID
> kernel 0 #I9QGIP:CVE-2024-35936<
https://gitee.com/open_euler/dashboard?issue_id=I9QGIP
> kernel 0 #I9RFMU:CVE-2023-52805<
https://gitee.com/open_euler/dashboard?issue_id=I9RFMU
> kernel 0 #I9RG0I:CVE-2023-52879<
https://gitee.com/open_euler/dashboard?issue_id=I9RG0I
> kernel 0 #I9RG40:CVE-2023-52804<
https://gitee.com/open_euler/dashboard?issue_id=I9RG40
> kernel 0 Bugfix: issue 仓库 #I9RCAW: sendmail-redhat.mc编译时被改变<
https://gitee.com/open_euler/dashboard?issue_id=I9RCAW
> sendmail #I9RM9S:【22.03-LTS-SP1-update20240515】obs-api安装信息中存在冗余的无意义信息<
https://gitee.com/open_euler/dashboard?issue_id=I9RM9S
> obs-server #I9PWI2:[22.03-LTS-SP1-update20240515]obs-server安装卸载过程报错,obs-api升级失败<
https://gitee.com/open_euler/dashboard?issue_id=I9PWI2
> obs-server #I9R1JE:22.03-LTS系列分支未同步中文翻译补丁<
https://gitee.com/open_euler/dashboard?issue_id=I9R1JE
> cockpit #I9EWLP:CVE-2023-37328修复咨询<
https://gitee.com/open_euler/dashboard?issue_id=I9EWLP
> gstreamer1-plugins-base #I76JSK:[hulk5.10] xfs文件系统测试专项问题<
https://gitee.com/open_euler/dashboard?issue_id=I76JSK
> kernel #I8TANP:OLK5.10支持地址随机化区域指定<
https://gitee.com/open_euler/dashboard?issue_id=I8TANP
> kernel #I977K1:[OLK-5.10]沐创千兆兆网卡驱动适配<
https://gitee.com/open_euler/dashboard?issue_id=I977K1
> kernel #I9ATOW:[OLK-5.10]沐创万兆网卡vf驱动适配<
https://gitee.com/open_euler/dashboard?issue_id=I9ATOW
> kernel #I9BPVF:【OLK-5.10】Backporting Dirty ring feature<
https://gitee.com/open_euler/dashboard?issue_id=I9BPVF
> kernel #I9F23X:SPxxx系列RAID卡驱动新增SG_RAW命令返回值<
https://gitee.com/open_euler/dashboard?issue_id=I9F23X
> kernel #I9GT87:[openEuler-22.03-LTS-SP4] 用户态容器内存支持主动回收、压缩、去重<
https://gitee.com/open_euler/dashboard?issue_id=I9GT87
> kernel #I9GZAQ:[openEuler-22.03-LTS-SP4] 鲲鹏920支持自适应NUMA需求<
https://gitee.com/open_euler/dashboard?issue_id=I9GZAQ
> kernel #I9HCSA:【OLK-5.10】drivers/perf: hisi_pcie: Several updates for HiSilicon PCIe PMU driver<
https://gitee.com/open_euler/dashboard?issue_id=I9HCSA
> kernel #I9HYNM:【OLK-5.10】bzwx nce网卡驱动编译错误<
https://gitee.com/open_euler/dashboard?issue_id=I9HYNM
> kernel #I9JEA3:cgroup_writeback:bufferio限速自动绑定memcg和blkcg<
https://gitee.com/open_euler/dashboard?issue_id=I9JEA3
> kernel #I9K8D1:自研补丁推送openeuler社区<
https://gitee.com/open_euler/dashboard?issue_id=I9K8D1
> kernel #I9NGGU:[openEuler-22.03-SP4]更新支持云脉芯联MS/MV系列网卡<
https://gitee.com/open_euler/dashboard?issue_id=I9NGGU
> kernel #I9NGXP:[openEuler-1.0-LTS][OLK-5.10][OLK-6.6] 修复飞腾平台上使用BMC时可能出现的黑屏、花屏现象<
https://gitee.com/open_euler/dashboard?issue_id=I9NGXP
> kernel #I9NR7Q:[OLK-5.10] arm64服务器:允许cpu0作为nohz_full CPU<
https://gitee.com/open_euler/dashboard?issue_id=I9NR7Q
> kernel #I9OJK9:smart_grid: introducing rebuild_affinity_domain<
https://gitee.com/open_euler/dashboard?issue_id=I9OJK9
> kernel #I9PEF6:【OLK-6.6】make allnoconfig 编译报错<
https://gitee.com/open_euler/dashboard?issue_id=I9PEF6
> kernel #I9PX8J:回合主线补丁ip: Treat IPv4 segment's lowest address as unicast<
https://gitee.com/open_euler/dashboard?issue_id=I9PX8J
> kernel #I9Q85J:【OLK-5.10】add support for arm virtcca attestation<
https://gitee.com/open_euler/dashboard?issue_id=I9Q85J
> kernel #I9QO9C:【olk-5.10】 hns roce 补丁上传<
https://gitee.com/open_euler/dashboard?issue_id=I9QO9C
> kernel #I9QSJD:【OLK-5.10】Fix allmodconfig build error in hiroce3 driver<
https://gitee.com/open_euler/dashboard?issue_id=I9QSJD
> kernel #I9QYBA:【OLK-5.10】some bugfixes for net-hns3<
https://gitee.com/open_euler/dashboard?issue_id=I9QYBA
> kernel #I9R2TB:【OLK-5.10】hulk热补丁相关补丁同步<
https://gitee.com/open_euler/dashboard?issue_id=I9R2TB
> kernel #I9R3F8:【OLK-5.10】【OLK-6.6】Fix QOS_SCHED_DYNAMIC_AFFINITY kconfig<
https://gitee.com/open_euler/dashboard?issue_id=I9R3F8
> kernel #I9RB5N:主线补丁回合:net-memcg: Fix scope of sockmem pressure indicators<
https://gitee.com/open_euler/dashboard?issue_id=I9RB5N
> kernel #I9REGZ:【olk5.10】 kobject: Fix global-out-of-bounds in kobject_action_type()<
https://gitee.com/open_euler/dashboard?issue_id=I9REGZ
> kernel #I9RJQB:修复cifs中kmemleak问题<
https://gitee.com/open_euler/dashboard?issue_id=I9RJQB
> kernel #I9RQAS:[OLK-5.10/openEuler-22.03-LTS-SPx] virtio_ring : keep used_wrap_counter in vq->last_used_idx<
https://gitee.com/open_euler/dashboard?issue_id=I9RQAS
> kernel #I9RWXP:主线补丁回合:crypto: engine - fix crypto_queue backlog handling<
https://gitee.com/open_euler/dashboard?issue_id=I9RWXP
> kernel #I9RY3A:【OLK-5.10】bzwx N5/N6 series网卡驱动BUILD REGRESSIONG warning<
https://gitee.com/open_euler/dashboard?issue_id=I9RY3A
> kernel #I9S5DK:【OLK 5.10】回合PCC支持共享中断和type4<
https://gitee.com/open_euler/dashboard?issue_id=I9S5DK
> kernel #I9S5ZK:iommu相关函数预留kabi<
https://gitee.com/open_euler/dashboard?issue_id=I9S5ZK
> kernel #I9SGLA:【OLK-5.10】hip09 GICv4&&GICv4.1问题修复<
https://gitee.com/open_euler/dashboard?issue_id=I9SGLA
> kernel openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP3 I96ID7 [22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp 缺陷 2024/3/7 9:35 主要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
2 openEuler-22.03-LTS-SP3 I9AF9S 【22.03 LTS SP3】【arm/x86】openmpi相关命令执行失败 缺陷 2024/3/21 16:24 次要 src-openEuler/openmpi Application
https://gitee.com/open_euler/dashboard?issue_id=I9AF9S
3 openEuler-22.03-LTS-SP3 I9AFKH 【22.03 LTS SP3】【arm/x86】su - amandabackup -c "amdump_client --config DailySet1 list" 失败 缺陷 2024/3/21 16:39 次要 src-openEuler/amanda Application
https://gitee.com/open_euler/dashboard?issue_id=I9AFKH
4 openEuler-22.03-LTS-SP3 I9COG1 【openEuler-22.03-LTS-SP3】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:58 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9COG1
5 openEuler-22.03-LTS-SP3 I9KPF6 [22.03-LTS-SP3][deja]-floop-crc特性deja相关用例报错 缺陷 2024/4/29 16:32 次要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9KPF6
社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(5.31日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG issue码云链接 CVE-2024-4741 I9SYZ7 4.19 9.8 openssl sig-security-facility
https://gitee.com/src-openeuler/openssl/issues/I9SYZ7
CVE-2023-41419 I84A04 5.55 9.8 python-gevent Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2024-32114 I9R0A7 4.19 8.5 activemq Application
https://gitee.com/src-openeuler/activemq/issues/I9R0A7
CVE-2024-36039 I9RFH3 6.53 8.1 python-PyMySQL sig-python-modules
https://gitee.com/src-openeuler/python-PyMySQL/issues/I9RFH3
CVE-2022-48651 I9KHGQ 2.53 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9KHGQ
CVE-2009-3289 I9R17Q 4.19 7.8 glib2 Base-service
https://gitee.com/src-openeuler/glib2/issues/I9R17Q
CVE-2023-52760 I9R4LV 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4LV
CVE-2023-52772 I9R4LU 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4LU
CVE-2023-52769 I9R4LO 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4LO
CVE-2023-52752 I9R4LM 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4LM
CVE-2022-48686 I9LK6C 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9LK6C
CVE-2022-48694 I9LK6A 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9LK6A
CVE-2022-48670 I9LK4Z 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9LK4Z
CVE-2022-48672 I9LK4W 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9LK4W
CVE-2024-26933 I9L5L3 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L5L3
CVE-2024-26934 I9L5GW 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L5GW
CVE-2024-26932 I9L5E7 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L5E7
CVE-2024-26929 I9L5DX 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L5DX
CVE-2024-27022 I9L532 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L532
CVE-2024-27018 I9L4S5 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L4S5
CVE-2024-27021 I9L4PY 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L4PY
CVE-2024-26930 I9L4OZ 7.2 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L4OZ
CVE-2024-26921 I9HVTH 11.72 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HVTH
CVE-2024-26852 I9HK9R 11.72 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK9R
CVE-2024-35817 I9Q94F 11.78 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9Q94F
CVE-2019-13012 I9R1J5 4.19 7.5 glib2 Base-service
https://gitee.com/src-openeuler/glib2/issues/I9R1J5
CVE-2020-17519 I9RQOJ 7.2 7.5 flink sig-bigdata
https://gitee.com/src-openeuler/flink/issues/I9RQOJ
CVE-2024-3657 I9SZ4T 12.19 7.5 three-eight-nine-ds-base Application
https://gitee.com/src-openeuler/three-eight-nine-ds-base/issues/I9SZ4T
CVE-2024-26925 I9JFG3 2.53 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9JFG3
CVE-2022-48689 I9LK5X 7.2 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9LK5X
CVE-2024-27020 I9L5P0 7.2 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L5P0
CVE-2023-52846 I9RFHD 7.53 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9RFHD
CVE-2021-47379 I9R4N1 9.95 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4N1
CVE-2021-47342 I9R4CM 9.95 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9R4CM
CVE-2024-35950 I9QRRC 10.53 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9QRRC
CVE-2024-26865 I9HK3Q 11.72 7.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK3Q
CVE-2023-29406 I8Y47M 0.0 6.5 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I8Y47M
CVE-2023-39472 I9LH6F 2.2 6.5 ignition K8sDistro
https://gitee.com/src-openeuler/ignition/issues/I9LH6F
CVE-2023-28100 I9AVQ9 10.14 6.5 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2024-27030 I9L9N9 8.53 6.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9L9N9
CVE-2023-48795 I9AYAU 11.14 5.9 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2021-47110 I990A4 0.0 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990A4
CVE-2022-48641 I9KHGU 6.53 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9KHGU
CVE-2024-26889 I9HKEA 12.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HKEA
CVE-2024-26848 I9HK31 12.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK31
CVE-2024-26830 I9HJU9 12.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HJU9
CVE-2024-26833 I9HJQ2 12.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HJQ2
CVE-2023-22081 I88VNW 8.14 5.3 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2024-25768 I93XA8 5.78 5.0 opendmarc Base-service
https://gitee.com/src-openeuler/opendmarc/issues/I93XA8
CVE-2024-3096 I9G0JY 4.47 4.8 php Base-service
https://gitee.com/src-openeuler/php/issues/I9G0JY
CVE-2024-28180 I9IN8W 0.0 4.3 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9IN8W
CVE-2024-28180 I9C55E 8.14 4.3 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
CVE-2023-28101 I9AVQ7 10.14 4.3 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-42114 I85797 2.2 3.7 exim Application
https://gitee.com/src-openeuler/exim/issues/I85797
CVE-2023-22025 I88JFX 8.14 3.7 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2024-26877 I9HK1F 12.78 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK1F
CVE-2024-26835 I9HJR8 12.78 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HJR8
CVE-2023-42119 I85799 2.2 3.1 exim Application
https://gitee.com/src-openeuler/exim/issues/I85799
CVE-2023-35701 I9LHFK 1.78 0.0 hive sig-bigdata
https://gitee.com/src-openeuler/hive/issues/I9LHFK
CVE-2024-34517 I9N9ET 6.31 0.0 neo4j DB
https://gitee.com/src-openeuler/neo4j/issues/I9N9ET
CVE-2024-34397 I9N9EW 6.32 0.0 perl-Glib sig-mate-desktop
https://gitee.com/src-openeuler/perl-Glib/issues/I9N9EW
CVE-2024-34397 I9N9EV 6.32 0.0 glib2 Base-service
https://gitee.com/src-openeuler/glib2/issues/I9N9EV
CVE-2024-4317 I9NZZ9 7.96 0.0 libpq DB
https://gitee.com/src-openeuler/libpq/issues/I9NZZ9
CVE-2024-4317 I9NZZ4 7.96 0.0 postgresql DB
https://gitee.com/src-openeuler/postgresql/issues/I9NZZ4
CVE-2024-27393 I9O0MS 8.12 0.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9O0MS
CVE-2024-29510 I9O0O0 8.29 0.0 ghostscript Base-service
https://gitee.com/src-openeuler/ghostscript/issues/I9O0O0
CVE-2024-33869 I9O0OR 8.3 0.0 ghostscript Base-service
https://gitee.com/src-openeuler/ghostscript/issues/I9O0OR
CVE-2024-33871 I9O3LM 8.53 0.0 ghostscript Base-service
https://gitee.com/src-openeuler/ghostscript/issues/I9O3LM
CVE-2024-4317 I9OBD3 9.15 0.0 postgresql-13 DB
https://gitee.com/src-openeuler/postgresql-13/issues/I9OBD3
CVE-2024-33875 I9OBE3 9.28 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBE3
CVE-2024-32620 I9OBE2 9.28 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBE2
CVE-2024-32622 I9OBE1 9.28 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBE1
CVE-2024-29157 I9OBFI 9.38 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFI
CVE-2024-33877 I9OBG6 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBG6
CVE-2024-32621 I9OBFZ 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFZ
CVE-2024-32619 I9OBFW 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFW
CVE-2024-32616 I9OBFU 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFU
CVE-2024-32623 I9OBFS 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFS
CVE-2024-32618 I9OBFP 9.39 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBFP
CVE-2024-32615 I9OBXM 9.44 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBXM
CVE-2024-32617 I9OBX0 9.44 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OBX0
CVE-2024-32613 I9OEBD 9.52 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OEBD
CVE-2024-32624 I9OEAQ 9.52 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OEAQ
CVE-2024-32614 I9OE9X 9.52 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OE9X
CVE-2024-32612 I9OE7O 9.52 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OE7O
CVE-2024-33876 I9OEGF 9.53 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OEGF
CVE-2024-33874 I9OEFV 9.53 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OEFV
CVE-2024-33873 I9OEEX 9.53 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OEEX
CVE-2024-29158 I9OFPM 9.63 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OFPM
CVE-2024-29163 I9OLD2 9.95 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLD2
CVE-2024-29159 I9OLCX 9.95 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLCX
CVE-2024-29165 I9OLCS 9.95 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLCS
CVE-2024-32606 I9OLE5 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLE5
CVE-2024-32611 I9OLDW 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDW
CVE-2024-32610 I9OLDU 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDU
CVE-2024-29166 I9OLDK 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDK
CVE-2024-29161 I9OLDI 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDI
CVE-2024-29162 I9OLDE 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDE
CVE-2024-29164 I9OLDB 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLDB
CVE-2024-29160 I9OLD5 9.96 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLD5
CVE-2024-32605 I9OLF8 9.97 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLF8
CVE-2024-32609 I9OLF3 9.97 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLF3
CVE-2024-32607 I9OLEH 9.97 0.0 hdf5 Runtime
https://gitee.com/src-openeuler/hdf5/issues/I9OLEH
CVE-2024-27401 I9OZA3 11.86 0.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9OZA3
CVE-2024-4840 I9P0OB 12.32 0.0 mysql5 DB
https://gitee.com/src-openeuler/mysql5/issues/I9P0OB
CVE-2024-33952 I9PCQ3 13.44 0.0 unique Base-service
https://gitee.com/src-openeuler/unique/issues/I9PCQ3
社区关键组件待修复缺陷: openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。 社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑): 序号 任务ID 任务标题 创建时间 优先级 关联仓库 sig组 任务路径 1 I4V9K0 gcc 10.3.0 __libc_vfork符号丢失(i686架构) 2022/2/25 14:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2 I4YT2R iscsi登录操作并发sysfs读操作概率导致空指针访问 2022/3/21 15:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3 I58CJR 删除iptable_filter.ko时出现空指针问题 2022/5/19 20:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4 I5C33B OLK-5.10 page owner功能增强 2022/6/13 20:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5 I5D9J8 Upgrade to latest release [kernel: 5.10.0 -> 5.17] 2022/6/21 10:01 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6 I5G321 【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic 2022/7/8 9:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7 I5H311 修复CVE-2022-2380 2022/7/14 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8 I5I2M8 x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware. 2022/7/21 9:47 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9 I5OOLB 反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397 2022/8/29 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10 I5PBRB 注入内存申请故障,i40iw_initialize_dev失败时出现oops复位 2022/9/2 9:56 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11 I5RH8C 内存可靠性分级需求 2022/9/16 16:16 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12 I5V92B openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划 2022/10/12 11:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13 I5VCIJ openEuler如何适配新硬件,请提供适配流程指导 2022/10/12 17:14 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14 I5WCP1 回合bpftool prog attach/detach命令 2022/10/18 16:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15 I6FZWY 主线回合scsi: iscsi_tcp: Fix UAF during logout and login 2023/2/18 11:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
16 I6HXB9 kernel.spec中是否会新增打包intel-sst工具 2023/2/27 10:06 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
17 I6MJB4 openssl 3.0 支持TLCP特性 2023/3/13 11:35 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
18 I6N49D 【openeuler-22.03-LTS-SP】 2023/3/14 20:12 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
19 I6TQ8W curl命令向hadoop3.2.1 webhdfs put文件失败 2023/4/7 18:02 严重 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
20 I6UDV8 Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp 2023/4/10 16:14 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
21 I6VWNS 主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析 2023/4/15 10:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
22 I70VML 指针压缩选项的错误提示内容有误。 2023/5/6 16:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
23 I71KX8 python3.spec文件中,无效的ifarch语句 2023/5/9 15:00 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
24 I7B6KR kerberos安装缺少krb5-auth-dialog 和 krb5-workstation 2023/6/6 9:51 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
25 I7CKVY peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错 2023/6/11 22:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
26 I7CWOS Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level 2023/6/12 20:51 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
27 I7EZAZ 无法在sw_64下编译nodejs 2023/6/20 16:50 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
28 I7LSWG Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03] 2023/7/17 20:50 无优先级 src-openEuler/gtk2 Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
29 I8A77R Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01] 2023/10/23 16:22 无优先级 src-openEuler/alsa-lib Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
30 I8KAVR dnf reinstall kernel 导致grub.conf 本内核项被删除 2023/11/29 10:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
31 I8ON5A Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13] 2023/12/15 11:04 无优先级 src-openEuler/cronie Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
32 I8ON6X Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21] 2023/12/15 11:06 无优先级 src-openEuler/dbus Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
33 I8OOF1 Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14] 2023/12/15 12:29 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
34 I8OOF5 Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11] 2023/12/15 12:31 无优先级 src-openEuler/libarchive Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
35 I8PL8Q Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17] 2023/12/19 11:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
36 I8SZWW qemu 4.1 虚拟机热迁移到qemu 6.2失败 2024/1/2 17:01 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
37 I8UCFC 鲲鹏920服务器多次重启后系统盘盘符跳变 2024/1/8 11:18 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
38 I8VIRN Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31] 2024/1/12 9:17 无优先级 src-openEuler/libcap sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
39 I8VIRQ Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13] 2024/1/12 9:17 无优先级 src-openEuler/libselinux sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
40 I8XTDI rpm宏用$引用可能会出现空值 2024/1/21 22:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
41 I8ZJG1 欧拉系统virt-install 创建虚拟机video类型默认使用qxl 2024/1/29 10:44 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
42 I930G8 【24.03 LTS】软件包选型 2024/2/22 19:34 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I930G8
43 I931BJ 【24.03 LTS】软件包选型 2024/2/22 20:36 无优先级 src-openEuler/sqlite DB
https://gitee.com/open_euler/dashboard?issue_id=I931BJ
44 I93C47 【24.03 LTS】软件包选型 2024/2/23 17:46 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I93C47
45 I95DT3 openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布? 2024/3/4 0:39 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
46 I96B4W systemd中缺少文件 2024/3/6 14:53 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
47 I96BZU 逻辑卷组修复 2024/3/6 15:36 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
48 I97V59 preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机 2024/3/12 16:09 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
49 I9BNUP 使用clang时缺少gnu/stubs-32.h文件 2024/3/26 13:43 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
50 I9C507 gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化 2024/3/27 18:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
51 I9COZE 【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式 2024/3/29 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
52 I9CQSL openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡 2024/3/29 16:57 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
53 I9DV2U spec文件不同架构分支存在相同构建方式 2024/4/3 11:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
54 I9FU1M [openEuler-22.03-LTS] libvirt install failed 2024/4/11 15:44 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
55 I9FVI3 22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步 2024/4/11 16:57 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
56 I9GV9V qemu-8.2.0-6.oe2403.x86_64.src.rpm 在编译的check阶段执行tests/qtest/bios-tables-test是测试失败 2024/4/15 20:30 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9GV9V
57 I9H2MR 【误解提示】救援模式下,提示用户输入root密码 2024/4/16 14:39 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H2MR
58 I9H736 Upgrade to latest release [libiscsi: 1.19.0 -> 1.20.0] 2024/4/16 17:40 无优先级 src-openEuler/libiscsi Storage
https://gitee.com/open_euler/dashboard?issue_id=I9H736
59 I9HBPH mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist 2024/4/17 10:23 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9HBPH
60 I9J6XR 【OLK 5.10】主线补丁回合:mm/mmap: fix memory leak in mmap_region() 2024/4/24 11:22 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6XR
61 I9J6ZB 【OLK 5.10】主线补丁回合:powerpc/32: Call mmu_mark_initmem_nx() regardless of data block mapping. 2024/4/24 11:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZB
62 I9J6ZO 【OLK 5.10】主线补丁回合:x86/mm/tlb: Revert retpoline avoidance approach 2024/4/24 11:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZO
63 I9JNBG 虚拟机使用ext4文件系统,扩容磁盘后,执行resize2fs扩容文件系统出错 2024/4/25 17:00 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9JNBG
64 I9K3JP gcc 11.0.4 编译报错 cc1plus: internal compiler error: in fail_formatted, at selftest.c:63 2024/4/27 12:12 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K3JP
65 I9KDQU 【oe-24.03】执行场景复现脚本报错 2024/4/28 16:10 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9KDQU
66 I9KPI1 [openeuler 24.03] qemu8.2 无法创建uefi虚拟机 2024/4/29 16:35 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9KPI1
67 I9KYID build error:nothing provides sign-openEuler 2024/4/30 15:21 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9KYID
68 I9MM3F 回合上游社区补丁,补丁数量:3 2024/5/6 16:39 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3F
69 I9MM3H 回合上游社区补丁,补丁数量:2 2024/5/6 16:39 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3H
70 I9NW26 回合上游社区补丁,补丁数量:1 2024/5/9 16:10 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I9NW26
71 I9OUAH 分区里有socket类型文件且有acl属性,在fsck全盘扫描时会误报出extended attributes的reference不对 2024/5/13 14:31 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9OUAH
72 I9OXPO 【24.03 LTS rc5】在kp920服务器上多种介质安装系统都卡死 2024/5/13 17:28 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9OXPO
73 I9P7JY CVE-2022-2068已经修复 但是未在 changelog中体现 2024/5/14 16:09 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I9P7JY
74 I9PDCZ systemctl提示超时 2024/5/15 9:54 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9PDCZ
75 I9POEK openldap不支持bdb数据库 2024/5/16 9:37 无优先级 src-openEuler/openldap Networking
https://gitee.com/open_euler/dashboard?issue_id=I9POEK
76 I9PSBG libvert: Live migration with the PCIe device is not supported. 2024/5/16 14:13 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9PSBG
77 I9PTEV 【22.03-SP1】安装22.03-SP1 rpm手册 2024/5/16 15:07 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9PTEV
78 I9PTFW 【22.03-SP1】kernel.spec存在changelog错误规范,编译无法构建 2024/5/16 15:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9PTFW
79 I9PUIJ 在部分网络配置下,无法持续获取IPv6网关配置信息 2024/5/16 16:10 无优先级 src-openEuler/NetworkManager Networking
https://gitee.com/open_euler/dashboard?issue_id=I9PUIJ
80 I9PVWK 执行perf命令 发生Segmentation fault,生成core文件 2024/5/16 17:29 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9PVWK
81 I9Q6IC virsh起虚机第一遍能成功,第二遍卡在UEFI的位置 2024/5/17 16:42 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9Q6IC
82 I9R62D Some APIs of the openssl 3.0.x engine mechanism are changed. As a result, uadk_engine is incompatible. 2024/5/22 10:02 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I9R62D
83 I9R6TX loongarch64缺少abi兼容列表 2024/5/22 10:43 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9R6TX
84 I9R9B0 重启NetworkManager后,使用ifconfig down/up接口,会丢失路由信息 2024/5/22 14:26 无优先级 src-openEuler/NetworkManager Networking
https://gitee.com/open_euler/dashboard?issue_id=I9R9B0
85 I9RCSD cat/split/dd 访问内存文件时,不能依据文件长度 2024/5/22 17:07 无优先级 src-openEuler/coreutils Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9RCSD
86 I9RMMA [上游补丁回合] 在expat-2.6.0环境check失败 2024/5/23 16:11 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9RMMA
87 I9RYMC core: use ASSERT_PTR(CAST(u)) everywhere 2024/5/24 16:54 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9RYMC
openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
>
1
0
0
0
【RM】openEuler 22.03 LTS SP4 RC2 版本release公告
by Fanjiachen(Jiachen,openEuler)
31 May '24
31 May '24
Dear all, openEuler 22.03 LTS SP4 RC2 版本每日构建可全量完整构建通过,每日AT验证无阻塞问题验证通过。社区各sig组及用户可基于该版本开展功能验证、体验,QA sig组请基于该版本开展软件包验证适配。 本次RC2版本由EulerMaker构建系统统一编译构建,社区开发者可继续按需使用。 各个SIG组可基于该版本开展组件自验证及试用,社区一起协作支撑openEuler22.03 LTS SP4 RC2版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler LTS版本的问题点,更可以帮助社区一起持续优化用户的体验! l openEuler 22.03 LTS SP4版本release
plan&特性清单公示链接:https://gitee.com/openeuler/release-management/blob/master/op…
l openEuler 22.03 LTS SP4 ALPHA&RC1 版本下载链接: x86&arm:http://121.36.84.172/dailybuild/EBS-openEuler-22.03-LTS-SP4/openeuler-2024-05-30-12-16-35/ openEuler
版本缺陷管理规范链接:https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7…
l openEuler EulerMaker构建系统:https://eulermaker.compass-ci.openeuler.openatom.cn/ l openEuler 22.03 LTS SP4 RC2 版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果,您的自验证结果将是release版本质量评估的充分信息依据; Stage Name Begin Time End Time Days Note Collect key features 2024/3/1 2024/4/30 60 版本需求收集 Change Review 1 2024/4/1 2024/4/12 25 Review 软件包变更(升级/退役/淘汰)SP版本尽可能保持版版本不变 Herited features 2024/4/1 2024/4/30 30 继承特性合入(Branch前完成合入) Develop 2024/3/1 2024/5/1 60 新特性开发,合入22.03 LTS Next/SP4 Kernel freezing 2024/5/2 2024/5/10 10 内核冻结 Branch 22.03 LTS SP4 2024/5/2 2024/5/15 15 22.03 LTS Next 拉取 22.03 LTS SP4 分支 Build & Alpha 2024/5/15 2024/5/21 7 新开发特性合入,Alpha版本发布 Test round 1 2024/5/24 2024/5/30 7 22.03 LTS SP4 启动集成测试(因基础设施延期2天) Change Review 2 2024/5/22 2024/5/24 3 发起软件包淘汰评审 Beta version release 2024/5/25 2024/5/28 4 22.03 LTS SP4 Beta版本发布 Test round 2(NOW☺) 2024/5/31 2024/6/2 7 全量验证 Change Review 3 2024/5/29 2024/6/3 3 分支启动冻结,只允许bug fix Test round 3 2024/6/3 2024/6/9 7 分支冻结,只允许bug fix(跨端午节,预祝开发者端午节快乐) Test round 4 2024/6/10 2024/6/16 7 回归测试 Test round 5 2024/6/17 2024/6/23 7 回归测试 Release Review 2024/6/23 2024/6/25 2 版本发布决策/ Go or No Go Release preparation 2024/6/26 2024/6/27 2 发布前准备阶段,发布件系统梳理 Release 2024/6/28 2024/6/29 2 社区Release评审通过正式发布 BR 范佳臣
1
0
0
0
yocto&embedded sig例会
by openEuler conference
29 May '24
29 May '24
您好! sig-Yocto 邀请您参加 2024-05-30 14:30 召开的Tencent会议(自动录制) 会议主题:yocto&embedded sig例会 会议内容: 欢迎申报议题
会议链接:https://meeting.tencent.com/dm/1r0KLllomNqD
会议纪要:https://etherpad.openeuler.org/p/sig-Yocto-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-Yocto invites you to attend the Tencent conference(auto recording) will be held at 2024-05-30 14:30, The subject of the conference is yocto&embedded sig例会, Summary: 欢迎申报议题 You can join the meeting at
https://meeting.tencent.com/dm/1r0KLllomNqD
. Add topics at
https://etherpad.openeuler.org/p/sig-Yocto-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
QA双周例会
by openEuler conference
29 May '24
29 May '24
您好! sig-QA 邀请您参加 2024-05-29 14:15 召开的WeLink会议(自动录制) 会议主题:QA双周例会 会议链接:https://meeting.huaweicloud.com:36443/#/j/982699227
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-QA invites you to attend the WeLink conference(auto recording) will be held at 2024-05-29 14:15, The subject of the conference is QA双周例会, You can join the meeting at
https://meeting.huaweicloud.com:36443/#/j/982699227
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
← Newer
1
...
23
24
25
26
27
28
29
...
339
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
Results per page:
10
25
50
100
200