mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
October
List overview
Download
Dev
----- 2024 -----
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
October 2019
dev@openeuler.org
10 participants
3361 discussions
Start a n
N
ew thread
acclib例会
by openEuler conference
14 May '24
14 May '24
您好! sig-AccLib 邀请您参加 2024-05-15 11:00 召开的Zoom会议 会议主题:acclib例会 会议链接:https://us06web.zoom.us/j/89929805835?pwd=T1VNyujE2w2pyWHbpBBgl5f2VvCrgq.1
会议纪要:https://etherpad.openeuler.org/p/sig-AccLib-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-AccLib invites you to attend the Zoom conference will be held at 2024-05-15 11:00, The subject of the conference is acclib例会, You can join the meeting at
https://us06web.zoom.us/j/89929805835?pwd=T1VNyujE2w2pyWHbpBBgl5f2VvCrgq.1
. Add topics at
https://etherpad.openeuler.org/p/sig-AccLib-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
【RM】openEuler 24.03 LTS RC5版本release公告
by Fanjiachen(Jiachen,openEuler)
13 May '24
13 May '24
Dear all, openEuler 24.03 LTS RC5版本每日构建可全量完整构建通过,每日AT验证无阻塞问题验证通过。社区各sig组及用户可基于该版本开展功能验证、体验,QA sig组请基于该版本开展软件包验证适配。 本次RC5版本继续由EulerMaker构建系统统一编译构建,社区开发者可继续按需使用。 各个SIG组可基于该版本开展组件自验证及试用,社区一起协作支撑openEuler 24.03 LTS版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler LTS版本的问题点,更可以帮助社区一起持续优化用户的体验! l openEuler 24.03 LTS 版本release
plan&特性清单公示链接:https://gitee.com/openeuler/release-management/blob/master/op…
l openEuler 24.03 LTS RC5版本下载链接: x86&arm:http://121.36.84.172/dailybuild/EBS-openEuler-24.03-LTS/rc5_openeuler-2024-05-12-18-44-59/ risc-v:
https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems3/repositories/o…
ppc:
https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems3/repositories/o…
LoongArch :
https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems3/repositories/o…
l openEuler
版本缺陷管理规范链接:https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7…
l openEuler EulerMaker构建系统:https://eulermaker.compass-ci.openeuler.openatom.cn/ l openEuler 24.03 LTS RC5版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果,您的自验证结果将是release版本质量评估的充分信息依据; Stage Name Begin Time End Time Days Note Collect key features 2023/12/8 2024/1/30 54 版本需求收集 Change Review 1 2024/1/16 2024/2/10 25 Review 软件包变更(升级/退役/淘汰) Herited features 2024/1/30 2024/2/29 30 继承特性合入 Develop 2023/12/1 2024/2/29 90 新特性开发,合入master;KABI预留,白名单制定及公示 Kernel freezing 2024/3/1 2024/3/10 10 内核冻结 Branch 24.03 LTS 2024/3/11 2024/3/20 10 master 拉取24.03 LTS Next及24.03 LTS分支 Branch 24.03 LTS mass rebuild 2024/3/21 2024/3/26 6 新分支大规模构建 Build & Alpha 2024/3/21 2024/3/30 7 新开发特性合入,Alpha版本发布 Test round 1 2024/3/31 2024/4/8 9 24.03 LTS 启动集成测试 Change Review 2 时间不变与RC3合并 2024/4/7 2024/4/9 3 发起需求变更,软件包淘汰评审 Beta version release时间不变与RC3合并 2024/4/3 2024/4/9 7 24.03 LTS Beta版本发布 Test round 2 2024/4/9 2024/4/15 6 模块级别测试 Change Review 3 2024/4/27 2024/4/29 3 发起需求变更,软件包淘汰评审 Test round 3 2024/4/16 2024/4/30 15 全量见证 Test round 4 2024/5/6 2024/5/12 7 回归测试,分支启动冻结,只允许bug fix Test round 5(NOW☺) 2024/5/13 2024/5/19 7 回归测试,分支冻结,只允许bug fix Test round 6(预留) 2024/5/20 2024/5/22 3 回归测试 Release Review 2024/5/21 2024/5/23 3 版本发布决策/ Go or No Go Release preparation 2024/5/24 2024/5/30 7 发布前准备阶段,发布件系统梳理 Release 2024/5/31 2024/5/31 1 社区Release评审通过正式发布 BR 范佳臣
1
0
0
0
[Release] openEuler update_20240508版本发布公告
by update版本发布邮箱
10 May '24
10 May '24
主题: openEuler update_20240508版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。 本公示分为九部分: 1、openEuler-20.03-LTS-SP1 Update 20240508发布情况及待修复缺陷 2、openEuler-22.03-LTS Update 20240508发布情况及待修复缺陷 3、openEuler-22.03-LTS-SP1 Update 20240508发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP2 Update 20240508发布情况及待修复缺陷 5、openEuler-20.03-LTS-SP4 Update 20240508发布情况及待修复缺陷 6、openEuler-22.03-LTS-SP3 Update 20240508发布情况及待修复缺陷 7、openEuler 关键组件待修复CVE 清单 8、openEuler 关键组件待修复缺陷清单 9、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2024/05/17)提供 update_20240515 版本。 openEuler-20.03-LTS-SP1 Update 20240508 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题13个,已知漏洞75个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTI?from=project-i…
CVE修复: CVE 仓库 score I4BY7B:CVE-2020-26950<
https://gitee.com/src-openeuler/firefox/issues/I4BY7B
> firefox 8.8 I9FNG2:CVE-2021-47194<
https://gitee.com/src-openeuler/kernel/issues/I9FNG2
> kernel 7.8 I9HJY0:CVE-2024-26898<
https://gitee.com/src-openeuler/kernel/issues/I9HJY0
> kernel 7.8 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 7.8 I9HKCB:CVE-2024-26883<
https://gitee.com/src-openeuler/kernel/issues/I9HKCB
> kernel 7.8 I9ENQO:CVE-2020-36829<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO
> perl-Mojolicious 7.5 I9ENQW:CVE-2021-47208<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW
> perl-Mojolicious 7.5 I9E2Q0:CVE-2024-27316<
https://gitee.com/src-openeuler/httpd/issues/I9E2Q0
> httpd 7.5 I9J3YK:CVE-2024-32661<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
> freerdp 7.5 I9DS2T:CVE-2024-3205<
https://gitee.com/src-openeuler/libyaml/issues/I9DS2T
> libyaml 7.3 I9HWXO:CVE-2023-3758<
https://gitee.com/src-openeuler/sssd/issues/I9HWXO
> sssd 7.1 I9J6JG:CVE-2020-35850<
https://gitee.com/src-openeuler/cockpit/issues/I9J6JG
> cockpit 6.5 I9E577:CVE-2023-38709<
https://gitee.com/src-openeuler/httpd/issues/I9E577
> httpd 6.1 I9E58K:CVE-2024-24795<
https://gitee.com/src-openeuler/httpd/issues/I9E58K
> httpd 6.1 I9EZL9:CVE-2024-2511<
https://gitee.com/src-openeuler/openssl/issues/I9EZL9
> openssl 5.9 I9LGC9:CVE-2024-34402<
https://gitee.com/src-openeuler/uriparser/issues/I9LGC9
> uriparser 5.5 I9LGCZ:CVE-2024-34403<
https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ
> uriparser 5.5 I9EZYH:CVE-2024-31047<
https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH
> OpenEXR 5.5 I99JQV:CVE-2023-52619<
https://gitee.com/src-openeuler/kernel/issues/I99JQV
> kernel 5.5 I9BGKK:CVE-2021-47149<
https://gitee.com/src-openeuler/kernel/issues/I9BGKK
> kernel 5.5 I9BV23:CVE-2024-26644<
https://gitee.com/src-openeuler/kernel/issues/I9BV23
> kernel 5.5 I9E2M9:CVE-2024-26773<
https://gitee.com/src-openeuler/kernel/issues/I9E2M9
> kernel 5.5 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 5.5 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 5.5 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 5.5 I9HOEF:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
> kernel 5.5 I9LK3Y:CVE-2022-48674<
https://gitee.com/src-openeuler/kernel/issues/I9LK3Y
> kernel 5.5 I9AR03:CVE-2022-2806<
https://gitee.com/src-openeuler/sos/issues/I9AR03
> sos 5.5 I9HK1I:CVE-2024-26901<
https://gitee.com/src-openeuler/kernel/issues/I9HK1I
> kernel 5.5 I9HK4U:CVE-2024-26904<
https://gitee.com/src-openeuler/kernel/issues/I9HK4U
> kernel 5.5 I917MX:CVE-2024-24860<
https://gitee.com/src-openeuler/kernel/issues/I917MX
> kernel 5.3 I990B2:CVE-2021-47121<
https://gitee.com/src-openeuler/kernel/issues/I990B2
> kernel 4.7 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 4.4 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 4.4 I9FV3V:CVE-2024-3652<
https://gitee.com/src-openeuler/libreswan/issues/I9FV3V
> libreswan 3.5 I9JBL4:CVE-2024-27282<
https://gitee.com/src-openeuler/ruby/issues/I9JBL4
> ruby 3.5 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 3.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 3.3 I9HIQ7:CVE-2024-3177<
https://gitee.com/src-openeuler/kubernetes/issues/I9HIQ7
> kubernetes 2.7 I9E6TQ:CVE-2024-26813<
https://gitee.com/src-openeuler/kernel/issues/I9E6TQ
> kernel 1 I9GE8D:CVE-2024-26817<
https://gitee.com/src-openeuler/kernel/issues/I9GE8D
> kernel 1 I9HJPD:CVE-2024-26839<
https://gitee.com/src-openeuler/kernel/issues/I9HJPD
> kernel 1 I9HJQC:CVE-2024-26845<
https://gitee.com/src-openeuler/kernel/issues/I9HJQC
> kernel 1 I9HJRD:CVE-2024-26828<
https://gitee.com/src-openeuler/kernel/issues/I9HJRD
> kernel 1 I9HJUW:CVE-2024-26825<
https://gitee.com/src-openeuler/kernel/issues/I9HJUW
> kernel 1 I9HJVQ:CVE-2024-26840<
https://gitee.com/src-openeuler/kernel/issues/I9HJVQ
> kernel 1 I9HJVU:CVE-2023-52642<
https://gitee.com/src-openeuler/kernel/issues/I9HJVU
> kernel 1 I9HJX7:CVE-2024-26878<
https://gitee.com/src-openeuler/kernel/issues/I9HJX7
> kernel 1 I9HJXK:CVE-2024-26863<
https://gitee.com/src-openeuler/kernel/issues/I9HJXK
> kernel 1 I9HJXV:CVE-2024-26880<
https://gitee.com/src-openeuler/kernel/issues/I9HJXV
> kernel 1 I9HJZO:CVE-2024-26882<
https://gitee.com/src-openeuler/kernel/issues/I9HJZO
> kernel 1 I9HK5V:CVE-2024-26874<
https://gitee.com/src-openeuler/kernel/issues/I9HK5V
> kernel 1 I9HK63:CVE-2024-26894<
https://gitee.com/src-openeuler/kernel/issues/I9HK63
> kernel 1 I9HK8R:CVE-2024-26875<
https://gitee.com/src-openeuler/kernel/issues/I9HK8R
> kernel 1 I9HK8Y:CVE-2024-26872<
https://gitee.com/src-openeuler/kernel/issues/I9HK8Y
> kernel 1 I9HK9B:CVE-2024-26857<
https://gitee.com/src-openeuler/kernel/issues/I9HK9B
> kernel 1 I9HK9J:CVE-2024-26859<
https://gitee.com/src-openeuler/kernel/issues/I9HK9J
> kernel 1 I9HK9R:CVE-2024-26852<
https://gitee.com/src-openeuler/kernel/issues/I9HK9R
> kernel 1 I9HKAZ:CVE-2024-26851<
https://gitee.com/src-openeuler/kernel/issues/I9HKAZ
> kernel 1 I9HKEE:CVE-2024-26876<
https://gitee.com/src-openeuler/kernel/issues/I9HKEE
> kernel 1 I9HL6R:CVE-2024-26915<
https://gitee.com/src-openeuler/kernel/issues/I9HL6R
> kernel 1 I9J3KG:CVE-2024-26922<
https://gitee.com/src-openeuler/kernel/issues/I9J3KG
> kernel 1 I9J7N6:CVE-2024-26813<
https://gitee.com/src-openeuler/kernel/issues/I9J7N6
> kernel 1 I9JFG0:CVE-2024-26923<
https://gitee.com/src-openeuler/kernel/issues/I9JFG0
> kernel 1 I9JJ2F:CVE-2024-26926<
https://gitee.com/src-openeuler/kernel/issues/I9JJ2F
> kernel 1 I9KHGY:CVE-2022-48664<
https://gitee.com/src-openeuler/kernel/issues/I9KHGY
> kernel 1 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 1 I9L5QJ:CVE-2024-26973<
https://gitee.com/src-openeuler/kernel/issues/I9L5QJ
> kernel 1 I9LKE1:CVE-2022-48702<
https://gitee.com/src-openeuler/kernel/issues/I9LKE1
> kernel 1 I9F94L:CVE-2023-45935<
https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L
> qt5-qtbase 0 I9FNFF:CVE-2021-47183<
https://gitee.com/src-openeuler/kernel/issues/I9FNFF
> kernel 0 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 0 I9FNFO:CVE-2021-47217<
https://gitee.com/src-openeuler/kernel/issues/I9FNFO
> kernel 0 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 0 I9FNFL:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9FNFL
> kernel 0 Bugfix: issue 仓库 #I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog cdrkit #I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合 httpd #I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行 pesign #I9ER36:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58 kernel #I9GV9R:【openeuler-1.0-lts】网络lts 4.19.308补丁回合:【openeuler-1.0-lts】网络lts 4.19.308补丁回合 kernel #I9HSOM:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup kernel #I9IPML:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock kernel #I9J08D:【OLK-5.10】多PF并发创建VF时间变长:【OLK-5.10】多PF并发创建VF时间变长 kernel #I9JNPZ:【OLK-5.10】 4月主线补丁分析回合:【OLK-5.10】 4月主线补丁分析回合 kernel #I9K34B:sched/rt: Fix sysctl_sched_rr_timeslice intial value:sched/rt: Fix sysctl_sched_rr_timeslice intial value kernel #I9K4H3:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset kernel #I9K4JZ:sched/rt: Disallow writing invalid values to sched_rt_period_us:sched/rt: Disallow writing invalid values to sched_rt_period_us kernel #I9K8XT:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 缺陷 2021/3/30 10:01 主要 src-openEuler/hadoop bigdata
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
2 openEuler-20.03-LTS-SP1 I5OYJZ kernel源码包构建失败 任务 2022/8/31 11:21 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OYJZ
3 openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 缺陷 2022/10/28 15:22 无优先级 src-openEuler/mate-desktop sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
4 openEuler-20.03-LTS-SP1 I8B80Y gcc中LTO的功能好像出现异常 任务 2023/10/26 19:15 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8B80Y
5 openEuler-20.03-LTS-SP1 I9O25N [20.03-LTS-SP1]安装apr-util-devel有报错提示 缺陷 2024/5/10 10:13 次要 src-openEuler/apr-util Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9O25N
6 openEuler-20.03-LTS-SP1-round-3 I9O8SA 【24.03-LTS-RC3】DDE桌面单击任务栏电源按钮无反应 任务 2024/5/10 17:26 无优先级 src-openEuler/dde sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I9O8SA
openEuler-22.03-LTS Update 20240508 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题7个,已知漏洞96个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTC?from=project-i…
CVE修复: CVE 仓库 score I9HK1R:CVE-2024-26885<
https://gitee.com/src-openeuler/kernel/issues/I9HK1R
> kernel 7.8 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 7.8 I9HKCB:CVE-2024-26883<
https://gitee.com/src-openeuler/kernel/issues/I9HKCB
> kernel 7.8 I9JQQ2:CVE-2024-33599<
https://gitee.com/src-openeuler/glibc/issues/I9JQQ2
> glibc 7.6 I9ENQO:CVE-2020-36829<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO
> perl-Mojolicious 7.5 I9ENQW:CVE-2021-47208<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW
> perl-Mojolicious 7.5 I9E2Q0:CVE-2024-27316<
https://gitee.com/src-openeuler/httpd/issues/I9E2Q0
> httpd 7.5 I9J3YK:CVE-2024-32661<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
> freerdp 7.5 I9L9FT:CVE-2024-4340<
https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT
> python-sqlparse 7.5 I9JQRA:CVE-2024-33600<
https://gitee.com/src-openeuler/glibc/issues/I9JQRA
> glibc 7.5 I9DS2T:CVE-2024-3205<
https://gitee.com/src-openeuler/libyaml/issues/I9DS2T
> libyaml 7.3 I9HWXO:CVE-2023-3758<
https://gitee.com/src-openeuler/sssd/issues/I9HWXO
> sssd 7.1 I8TQCT:CVE-2023-6270<
https://gitee.com/src-openeuler/kernel/issues/I8TQCT
> kernel 7 I9J6JG:CVE-2020-35850<
https://gitee.com/src-openeuler/cockpit/issues/I9J6JG
> cockpit 6.5 I8WQRS:CVE-2024-20973<
https://gitee.com/src-openeuler/mysql/issues/I8WQRS
> mysql 6.5 I8WQRY:CVE-2024-20962<
https://gitee.com/src-openeuler/mysql/issues/I8WQRY
> mysql 6.5 I8WQRZ:CVE-2024-20977<
https://gitee.com/src-openeuler/mysql/issues/I8WQRZ
> mysql 6.5 I8WQS2:CVE-2024-20963<
https://gitee.com/src-openeuler/mysql/issues/I8WQS2
> mysql 6.5 I8WQVV:CVE-2024-20985<
https://gitee.com/src-openeuler/mysql/issues/I8WQVV
> mysql 6.5 I8WQTY:CVE-2024-20961<
https://gitee.com/src-openeuler/mysql/issues/I8WQTY
> mysql 6.5 I8WQUL:CVE-2024-20960<
https://gitee.com/src-openeuler/mysql/issues/I8WQUL
> mysql 6.5 I9KGKD:CVE-2023-6129<
https://gitee.com/src-openeuler/mysql/issues/I9KGKD
> mysql 6.5 I9JQQ3:CVE-2024-33601<
https://gitee.com/src-openeuler/glibc/issues/I9JQQ3
> glibc 6.2 I9E58K:CVE-2024-24795<
https://gitee.com/src-openeuler/httpd/issues/I9E58K
> httpd 6.1 I9E577:CVE-2023-38709<
https://gitee.com/src-openeuler/httpd/issues/I9E577
> httpd 6.1 I9JUKA:CVE-2022-48682<
https://gitee.com/src-openeuler/fdupes/issues/I9JUKA
> fdupes 6 I9EZL9:CVE-2024-2511<
https://gitee.com/src-openeuler/openssl/issues/I9EZL9
> openssl 5.9 I9AR03:CVE-2022-2806<
https://gitee.com/src-openeuler/sos/issues/I9AR03
> sos 5.5 I9LGC9:CVE-2024-34402<
https://gitee.com/src-openeuler/uriparser/issues/I9LGC9
> uriparser 5.5 I9LGCZ:CVE-2024-34403<
https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ
> uriparser 5.5 I9EZYH:CVE-2024-31047<
https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH
> OpenEXR 5.5 I8WQU9:CVE-2024-20967<
https://gitee.com/src-openeuler/mysql/issues/I8WQU9
> mysql 5.5 I8WQXN:CVE-2024-20969<
https://gitee.com/src-openeuler/mysql/issues/I8WQXN
> mysql 5.5 I9BV23:CVE-2024-26644<
https://gitee.com/src-openeuler/kernel/issues/I9BV23
> kernel 5.5 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 5.5 I9E2M9:CVE-2024-26773<
https://gitee.com/src-openeuler/kernel/issues/I9E2M9
> kernel 5.5 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 5.5 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 5.5 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 5.5 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 5.5 I9E46I:CVE-2024-26788<
https://gitee.com/src-openeuler/kernel/issues/I9E46I
> kernel 5.5 I91L79:CVE-2024-25739<
https://gitee.com/src-openeuler/kernel/issues/I91L79
> kernel 5.5 I9HK1I:CVE-2024-26901<
https://gitee.com/src-openeuler/kernel/issues/I9HK1I
> kernel 5.5 I9HKBT:CVE-2024-26900<
https://gitee.com/src-openeuler/kernel/issues/I9HKBT
> kernel 5.5 I8WQRN:CVE-2024-20964<
https://gitee.com/src-openeuler/mysql/issues/I8WQRN
> mysql 5.3 I9H9UX:CVE-2024-20994<
https://gitee.com/src-openeuler/mysql/issues/I9H9UX
> mysql 5.3 I8WQRQ:CVE-2024-20971<
https://gitee.com/src-openeuler/mysql/issues/I8WQRQ
> mysql 4.9 I8WQRR:CVE-2024-20976<
https://gitee.com/src-openeuler/mysql/issues/I8WQRR
> mysql 4.9 I8WQRU:CVE-2024-20978<
https://gitee.com/src-openeuler/mysql/issues/I8WQRU
> mysql 4.9 I8WQRW:CVE-2024-20981<
https://gitee.com/src-openeuler/mysql/issues/I8WQRW
> mysql 4.9 I8WQSX:CVE-2024-20965<
https://gitee.com/src-openeuler/mysql/issues/I8WQSX
> mysql 4.9 I8WQT7:CVE-2024-20972<
https://gitee.com/src-openeuler/mysql/issues/I8WQT7
> mysql 4.9 I8WQTZ:CVE-2024-20982<
https://gitee.com/src-openeuler/mysql/issues/I8WQTZ
> mysql 4.9 I8WQU7:CVE-2024-20970<
https://gitee.com/src-openeuler/mysql/issues/I8WQU7
> mysql 4.9 I8WQUE:CVE-2024-20974<
https://gitee.com/src-openeuler/mysql/issues/I8WQUE
> mysql 4.9 I8WQUG:CVE-2024-20966<
https://gitee.com/src-openeuler/mysql/issues/I8WQUG
> mysql 4.9 I9H9TA:CVE-2024-21069<
https://gitee.com/src-openeuler/mysql/issues/I9H9TA
> mysql 4.9 I9H9TE:CVE-2024-21009<
https://gitee.com/src-openeuler/mysql/issues/I9H9TE
> mysql 4.9 I9H9TF:CVE-2024-21061<
https://gitee.com/src-openeuler/mysql/issues/I9H9TF
> mysql 4.9 I9H9TG:CVE-2024-20993<
https://gitee.com/src-openeuler/mysql/issues/I9H9TG
> mysql 4.9 I9H9TO:CVE-2024-21047<
https://gitee.com/src-openeuler/mysql/issues/I9H9TO
> mysql 4.9 I9H9TP:CVE-2024-20998<
https://gitee.com/src-openeuler/mysql/issues/I9H9TP
> mysql 4.9 I9H9TZ:CVE-2024-21055<
https://gitee.com/src-openeuler/mysql/issues/I9H9TZ
> mysql 4.9 I9H9V4:CVE-2024-21057<
https://gitee.com/src-openeuler/mysql/issues/I9H9V4
> mysql 4.9 I9H9U6:CVE-2024-21060<
https://gitee.com/src-openeuler/mysql/issues/I9H9U6
> mysql 4.9 I9H9UD:CVE-2024-21102<
https://gitee.com/src-openeuler/mysql/issues/I9H9UD
> mysql 4.9 I9H9UE:CVE-2024-21054<
https://gitee.com/src-openeuler/mysql/issues/I9H9UE
> mysql 4.9 I9H9UG:CVE-2024-21062<
https://gitee.com/src-openeuler/mysql/issues/I9H9UG
> mysql 4.9 I9H9VR:CVE-2024-21096<
https://gitee.com/src-openeuler/mysql/issues/I9H9VR
> mysql 4.9 I9LHKK:CVE-2024-34062<
https://gitee.com/src-openeuler/python-tqdm/issues/I9LHKK
> python-tqdm 4.8 I9G0JY:CVE-2024-3096<
https://gitee.com/src-openeuler/php/issues/I9G0JY
> php 4.8 I94UOT:CVE-2024-26607<
https://gitee.com/src-openeuler/kernel/issues/I94UOT
> kernel 4.7 I8WQUA:CVE-2024-20984<
https://gitee.com/src-openeuler/mysql/issues/I8WQUA
> mysql 4.4 I9H9U2:CVE-2024-21013<
https://gitee.com/src-openeuler/mysql/issues/I9H9U2
> mysql 4.4 I9H9UA:CVE-2024-21008<
https://gitee.com/src-openeuler/mysql/issues/I9H9UA
> mysql 4.4 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 4.4 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 4.4 I9JQRC:CVE-2024-33602<
https://gitee.com/src-openeuler/glibc/issues/I9JQRC
> glibc 4 I9H9T9:CVE-2024-21000<
https://gitee.com/src-openeuler/mysql/issues/I9H9T9
> mysql 3.8 I9FV3V:CVE-2024-3652<
https://gitee.com/src-openeuler/libreswan/issues/I9FV3V
> libreswan 3.5 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 3.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 3.3 I9FNF8:CVE-2021-47212<
https://gitee.com/src-openeuler/kernel/issues/I9FNF8
> kernel 1 I9GE8D:CVE-2024-26817<
https://gitee.com/src-openeuler/kernel/issues/I9GE8D
> kernel 1 I9HJPD:CVE-2024-26839<
https://gitee.com/src-openeuler/kernel/issues/I9HJPD
> kernel 1 I9HJU0:CVE-2024-26843<
https://gitee.com/src-openeuler/kernel/issues/I9HJU0
> kernel 1 I9HJVQ:CVE-2024-26840<
https://gitee.com/src-openeuler/kernel/issues/I9HJVQ
> kernel 1 I9HJVU:CVE-2023-52642<
https://gitee.com/src-openeuler/kernel/issues/I9HJVU
> kernel 1 I9HJZO:CVE-2024-26882<
https://gitee.com/src-openeuler/kernel/issues/I9HJZO
> kernel 1 I9HK2H:CVE-2024-26855<
https://gitee.com/src-openeuler/kernel/issues/I9HK2H
> kernel 1 I9HK5V:CVE-2024-26874<
https://gitee.com/src-openeuler/kernel/issues/I9HK5V
> kernel 1 I9HK63:CVE-2024-26894<
https://gitee.com/src-openeuler/kernel/issues/I9HK63
> kernel 1 I9HK8R:CVE-2024-26875<
https://gitee.com/src-openeuler/kernel/issues/I9HK8R
> kernel 1 I9HK9F:CVE-2024-26893<
https://gitee.com/src-openeuler/kernel/issues/I9HK9F
> kernel 1 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 0 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 0 Bugfix: issue 仓库 #I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog cdrkit #I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行 pesign #I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合 httpd #I9MLX3:TPCM功能问题:TPCM功能问题 shim #I9GVYW:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support kernel #I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合 kernel #I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe() kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-Dailybuild I4UTGM 22.03分支kernel子包perf与libtraceevent有安装冲突 任务 2022/2/22 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4UTGM
2 openEuler-22.03-LTS-Dailybuild I5CHET 使用nftables添加过多的规则时,内核将出现softlockup 任务 2022/6/15 19:33 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5CHET
3 openEuler-22.03-LTS-Dailybuild I5LO4A 【22.03 LTS ARM】鲲鹏 920 x8 安装 OS 时,卡死在内核启动界面。 任务 2022/8/10 17:19 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5LO4A
4 openEuler-22.03-LTS-Dailybuild I5RTUS X86架构下无法对mysql8进行autobolt模式反馈编译,报错 缺陷 2022/9/19 15:47 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
5 openEuler-22.03-LTS-Dailybuild I5XP8E Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支 缺陷 2022/10/26 9:13 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
6 openEuler-22.03-LTS-round-4 I65BIS swapoff 与 do_swap_page race问题 任务 2022/12/8 16:32 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I65BIS
7 openEuler-22.03-LTS-Dailybuild I65UF9 aarch64架构boost icl模板库优化错误 缺陷 2022/12/12 17:17 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
8 openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 缺陷 2023/4/13 16:35 次要 src-openEuler/mariadb DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
9 openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 缺陷 2023/5/12 15:38 次要 src-openEuler/php Base-service
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
10 openEuler-22.03-LTS-Dailybuild I7KBUF pyconfig-64.h中定义了__CHAR_UNSIGNED__ 改变了编译行为,导致程序运行出错 任务 2023/7/11 16:27 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7KBUF
11 openEuler-22.03-LTS update20230726 I7ORCE 【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 缺陷 2023/7/28 14:51 主要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
12 openEuler-22.03-LTS-Dailybuild I7YRN6 openEuler-20.03-LTS-SP3版本与openEuler-22.03-LTS版本x86上gcc参数差异导致编译出的二进制性能下降 任务 2023/9/5 17:06 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7YRN6
13 openEuler-22.03-LTS-Dailybuild I8OWON [openEuler-22.03-LTS]arch64在飞腾D2000内核初始化失败 任务 2023/12/16 9:40 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8OWON
openEuler-22.03-LTS-SP1 Update 20240508 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题7个,已知漏洞89个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTF?from=project-i…
CVE修复: CVE 仓库 score I8VT5F:CVE-2023-51698<
https://gitee.com/src-openeuler/atril/issues/I8VT5F
> atril 8.8 I9HK1R:CVE-2024-26885<
https://gitee.com/src-openeuler/kernel/issues/I9HK1R
> kernel 7.8 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 7.8 I9HKCB:CVE-2024-26883<
https://gitee.com/src-openeuler/kernel/issues/I9HKCB
> kernel 7.8 I9L9FT:CVE-2024-4340<
https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT
> python-sqlparse 7.5 I9E2Q0:CVE-2024-27316<
https://gitee.com/src-openeuler/httpd/issues/I9E2Q0
> httpd 7.5 I9J3YK:CVE-2024-32661<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
> freerdp 7.5 I9E4NE:CVE-2024-31080<
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4NE
> xorg-x11-server-xwayland 7.3 I9HWXO:CVE-2023-3758<
https://gitee.com/src-openeuler/sssd/issues/I9HWXO
> sssd 7.1 I8TQCT:CVE-2023-6270<
https://gitee.com/src-openeuler/kernel/issues/I8TQCT
> kernel 7 I9J6JG:CVE-2020-35850<
https://gitee.com/src-openeuler/cockpit/issues/I9J6JG
> cockpit 6.5 I8WQRS:CVE-2024-20973<
https://gitee.com/src-openeuler/mysql/issues/I8WQRS
> mysql 6.5 I8WQRY:CVE-2024-20962<
https://gitee.com/src-openeuler/mysql/issues/I8WQRY
> mysql 6.5 I8WQRZ:CVE-2024-20977<
https://gitee.com/src-openeuler/mysql/issues/I8WQRZ
> mysql 6.5 I8WQS2:CVE-2024-20963<
https://gitee.com/src-openeuler/mysql/issues/I8WQS2
> mysql 6.5 I8WQVV:CVE-2024-20985<
https://gitee.com/src-openeuler/mysql/issues/I8WQVV
> mysql 6.5 I8WQTY:CVE-2024-20961<
https://gitee.com/src-openeuler/mysql/issues/I8WQTY
> mysql 6.5 I8WQUL:CVE-2024-20960<
https://gitee.com/src-openeuler/mysql/issues/I8WQUL
> mysql 6.5 I9KGKD:CVE-2023-6129<
https://gitee.com/src-openeuler/mysql/issues/I9KGKD
> mysql 6.5 I9E577:CVE-2023-38709<
https://gitee.com/src-openeuler/httpd/issues/I9E577
> httpd 6.1 I9E58K:CVE-2024-24795<
https://gitee.com/src-openeuler/httpd/issues/I9E58K
> httpd 6.1 I9JUKA:CVE-2022-48682<
https://gitee.com/src-openeuler/fdupes/issues/I9JUKA
> fdupes 6 I9EZL9:CVE-2024-2511<
https://gitee.com/src-openeuler/openssl/issues/I9EZL9
> openssl 5.9 I9AR03:CVE-2022-2806<
https://gitee.com/src-openeuler/sos/issues/I9AR03
> sos 5.5 I9LGC9:CVE-2024-34402<
https://gitee.com/src-openeuler/uriparser/issues/I9LGC9
> uriparser 5.5 I8WQU9:CVE-2024-20967<
https://gitee.com/src-openeuler/mysql/issues/I8WQU9
> mysql 5.5 I8WQXN:CVE-2024-20969<
https://gitee.com/src-openeuler/mysql/issues/I8WQXN
> mysql 5.5 I91L79:CVE-2024-25739<
https://gitee.com/src-openeuler/kernel/issues/I91L79
> kernel 5.5 I94P5J:CVE-2023-52477<
https://gitee.com/src-openeuler/kernel/issues/I94P5J
> kernel 5.5 I9BV23:CVE-2024-26644<
https://gitee.com/src-openeuler/kernel/issues/I9BV23
> kernel 5.5 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 5.5 I9E2M9:CVE-2024-26773<
https://gitee.com/src-openeuler/kernel/issues/I9E2M9
> kernel 5.5 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 5.5 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 5.5 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 5.5 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 5.5 I9E46I:CVE-2024-26788<
https://gitee.com/src-openeuler/kernel/issues/I9E46I
> kernel 5.5 I9HK1I:CVE-2024-26901<
https://gitee.com/src-openeuler/kernel/issues/I9HK1I
> kernel 5.5 I9HKBT:CVE-2024-26900<
https://gitee.com/src-openeuler/kernel/issues/I9HKBT
> kernel 5.5 I8WQRN:CVE-2024-20964<
https://gitee.com/src-openeuler/mysql/issues/I8WQRN
> mysql 5.3 I9H9UX:CVE-2024-20994<
https://gitee.com/src-openeuler/mysql/issues/I9H9UX
> mysql 5.3 I8WQRQ:CVE-2024-20971<
https://gitee.com/src-openeuler/mysql/issues/I8WQRQ
> mysql 4.9 I8WQRR:CVE-2024-20976<
https://gitee.com/src-openeuler/mysql/issues/I8WQRR
> mysql 4.9 I8WQRU:CVE-2024-20978<
https://gitee.com/src-openeuler/mysql/issues/I8WQRU
> mysql 4.9 I8WQRW:CVE-2024-20981<
https://gitee.com/src-openeuler/mysql/issues/I8WQRW
> mysql 4.9 I8WQSX:CVE-2024-20965<
https://gitee.com/src-openeuler/mysql/issues/I8WQSX
> mysql 4.9 I8WQT7:CVE-2024-20972<
https://gitee.com/src-openeuler/mysql/issues/I8WQT7
> mysql 4.9 I8WQTZ:CVE-2024-20982<
https://gitee.com/src-openeuler/mysql/issues/I8WQTZ
> mysql 4.9 I8WQU7:CVE-2024-20970<
https://gitee.com/src-openeuler/mysql/issues/I8WQU7
> mysql 4.9 I8WQUE:CVE-2024-20974<
https://gitee.com/src-openeuler/mysql/issues/I8WQUE
> mysql 4.9 I8WQUG:CVE-2024-20966<
https://gitee.com/src-openeuler/mysql/issues/I8WQUG
> mysql 4.9 I9H9TA:CVE-2024-21069<
https://gitee.com/src-openeuler/mysql/issues/I9H9TA
> mysql 4.9 I9H9TE:CVE-2024-21009<
https://gitee.com/src-openeuler/mysql/issues/I9H9TE
> mysql 4.9 I9H9TF:CVE-2024-21061<
https://gitee.com/src-openeuler/mysql/issues/I9H9TF
> mysql 4.9 I9H9TG:CVE-2024-20993<
https://gitee.com/src-openeuler/mysql/issues/I9H9TG
> mysql 4.9 I9H9TO:CVE-2024-21047<
https://gitee.com/src-openeuler/mysql/issues/I9H9TO
> mysql 4.9 I9H9TP:CVE-2024-20998<
https://gitee.com/src-openeuler/mysql/issues/I9H9TP
> mysql 4.9 I9H9TZ:CVE-2024-21055<
https://gitee.com/src-openeuler/mysql/issues/I9H9TZ
> mysql 4.9 I9H9V4:CVE-2024-21057<
https://gitee.com/src-openeuler/mysql/issues/I9H9V4
> mysql 4.9 I9H9U6:CVE-2024-21060<
https://gitee.com/src-openeuler/mysql/issues/I9H9U6
> mysql 4.9 I9H9UD:CVE-2024-21102<
https://gitee.com/src-openeuler/mysql/issues/I9H9UD
> mysql 4.9 I9H9UE:CVE-2024-21054<
https://gitee.com/src-openeuler/mysql/issues/I9H9UE
> mysql 4.9 I9H9UG:CVE-2024-21062<
https://gitee.com/src-openeuler/mysql/issues/I9H9UG
> mysql 4.9 I9H9VR:CVE-2024-21096<
https://gitee.com/src-openeuler/mysql/issues/I9H9VR
> mysql 4.9 I9LHKK:CVE-2024-34062<
https://gitee.com/src-openeuler/python-tqdm/issues/I9LHKK
> python-tqdm 4.8 I94UOT:CVE-2024-26607<
https://gitee.com/src-openeuler/kernel/issues/I94UOT
> kernel 4.7 I8WQUA:CVE-2024-20984<
https://gitee.com/src-openeuler/mysql/issues/I8WQUA
> mysql 4.4 I9H9U2:CVE-2024-21013<
https://gitee.com/src-openeuler/mysql/issues/I9H9U2
> mysql 4.4 I9H9UA:CVE-2024-21008<
https://gitee.com/src-openeuler/mysql/issues/I9H9UA
> mysql 4.4 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 4.4 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 4.4 I9H9T9:CVE-2024-21000<
https://gitee.com/src-openeuler/mysql/issues/I9H9T9
> mysql 3.8 I9FV3V:CVE-2024-3652<
https://gitee.com/src-openeuler/libreswan/issues/I9FV3V
> libreswan 3.5 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 3.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 3.3 I9FNF8:CVE-2021-47212<
https://gitee.com/src-openeuler/kernel/issues/I9FNF8
> kernel 1 I9GE8D:CVE-2024-26817<
https://gitee.com/src-openeuler/kernel/issues/I9GE8D
> kernel 1 I9HJPD:CVE-2024-26839<
https://gitee.com/src-openeuler/kernel/issues/I9HJPD
> kernel 1 I9HJU0:CVE-2024-26843<
https://gitee.com/src-openeuler/kernel/issues/I9HJU0
> kernel 1 I9HJVQ:CVE-2024-26840<
https://gitee.com/src-openeuler/kernel/issues/I9HJVQ
> kernel 1 I9HJVU:CVE-2023-52642<
https://gitee.com/src-openeuler/kernel/issues/I9HJVU
> kernel 1 I9HJZO:CVE-2024-26882<
https://gitee.com/src-openeuler/kernel/issues/I9HJZO
> kernel 1 I9HK2H:CVE-2024-26855<
https://gitee.com/src-openeuler/kernel/issues/I9HK2H
> kernel 1 I9HK5V:CVE-2024-26874<
https://gitee.com/src-openeuler/kernel/issues/I9HK5V
> kernel 1 I9HK63:CVE-2024-26894<
https://gitee.com/src-openeuler/kernel/issues/I9HK63
> kernel 1 I9HK8R:CVE-2024-26875<
https://gitee.com/src-openeuler/kernel/issues/I9HK8R
> kernel 1 I9HK9F:CVE-2024-26893<
https://gitee.com/src-openeuler/kernel/issues/I9HK9F
> kernel 1 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 0 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 0 Bugfix: issue 仓库 #I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog cdrkit #I7DJYR:/etc/os-release文件同时存在ID和ID_LIKE时,构建报错:/etc/os-release文件同时存在ID和ID_LIKE时,构建报错 libreswan #I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行 pesign #I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合 httpd #I9MLX3:TPCM功能问题:TPCM功能问题 shim #I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合 kernel #I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe() kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP1 I6N49G 【openeuler-22.03-LTS-SP1】openeuler-22.03-LTS-SP1 x86默认不再编译bcache,导致bcache业务无法正常使用 任务 2023/3/14 20:13 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49G
2 openEuler-22.03-LTS-SP1 I6OLND 关闭kdump情况下触发panic可能会卡死 任务 2023/3/20 16:58 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6OLND
3 openEuler-22.03-LTS-SP1 I6ORVZ 【22.03-LTS-SP1】modprobe强制加载内核模块失败Key was rejected by service 任务 2023/3/21 10:52 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6ORVZ
4 openEuler-22.03-LTS-SP1 I6P3II [openEuler-22.03-LTS-SP1] arm 内核不支持files cgroup 任务 2023/3/22 10:20 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6P3II
5 openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 缺陷 2023/4/13 16:38 次要 src-openEuler/mariadb DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
6 openEuler-22.03-LTS-SP1 I6ZOUM qemu-6.2.0 内存预分配性能比 qemu-4.1.0有严重下降 任务 2023/4/28 17:37 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I6ZOUM
7 openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 缺陷 2023/5/16 9:01 次要 src-openEuler/php Base-service
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
8 openEuler-22.03-LTS-SP1 I73TNL 开启FIPS模式重启系统内核自检ofb(aes)算法失败导致panic 任务 2023/5/17 14:33 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I73TNL
9 openEuler-22.03-LTS-SP1 I7BM6U 【openEuler-22.03-LTS-SP1 】548子项异常波动问题跟踪 任务 2023/6/7 14:54 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7BM6U
10 openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 缺陷 2023/7/28 14:38 主要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
11 openEuler-22.03-LTS-SP1 I84L9F openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败 缺陷 2023/9/26 19:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
12 openEuler-22.03-LTS-SP1 I9CO8M 【openEuler-22.03-LTS-SP1】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:46 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CO8M
13 openEuler-22.03-LTS-SP1 I9K172 [22.03 LTS-SP1][deja] deja扫描类型用例执行部分失败 缺陷 2024/4/26 18:51 次要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K172
openEuler-22.03-LTS-SP2 Update 20240508 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞91个,目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTG?from=project-i…
CVE修复: CVE 仓库 score I6VZAQ:CVE-2023-2091<
https://gitee.com/src-openeuler/youker-assistant/issues/I6VZAQ
> youker-assistant 7.8 I8XH1F:CVE-2023-6816<
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8XH1F
> xorg-x11-server-xwayland 7.8 I9HK1R:CVE-2024-26885<
https://gitee.com/src-openeuler/kernel/issues/I9HK1R
> kernel 7.8 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 7.8 I9HKCB:CVE-2024-26883<
https://gitee.com/src-openeuler/kernel/issues/I9HKCB
> kernel 7.8 I9L9FT:CVE-2024-4340<
https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT
> python-sqlparse 7.5 I9C6X6:CVE-2022-32149<
https://gitee.com/src-openeuler/podman/issues/I9C6X6
> podman 7.5 I90BS5:CVE-2022-41723<
https://gitee.com/src-openeuler/ignition/issues/I90BS5
> ignition 7.5 I9E2Q0:CVE-2024-27316<
https://gitee.com/src-openeuler/httpd/issues/I9E2Q0
> httpd 7.5 I8YZNS:CVE-2023-6478<
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8YZNS
> xorg-x11-server-xwayland 7.5 I9J3YK:CVE-2024-32661<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
> freerdp 7.5 I9DS2T:CVE-2024-3205<
https://gitee.com/src-openeuler/libyaml/issues/I9DS2T
> libyaml 7.3 I9E4N7:CVE-2024-31081<
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N7
> xorg-x11-server-xwayland 7.3 I8TQCT:CVE-2023-6270<
https://gitee.com/src-openeuler/kernel/issues/I8TQCT
> kernel 7 I8WQRS:CVE-2024-20973<
https://gitee.com/src-openeuler/mysql/issues/I8WQRS
> mysql 6.5 I8WQRY:CVE-2024-20962<
https://gitee.com/src-openeuler/mysql/issues/I8WQRY
> mysql 6.5 I8WQRZ:CVE-2024-20977<
https://gitee.com/src-openeuler/mysql/issues/I8WQRZ
> mysql 6.5 I8WQS2:CVE-2024-20963<
https://gitee.com/src-openeuler/mysql/issues/I8WQS2
> mysql 6.5 I8WQVV:CVE-2024-20985<
https://gitee.com/src-openeuler/mysql/issues/I8WQVV
> mysql 6.5 I8WQTY:CVE-2024-20961<
https://gitee.com/src-openeuler/mysql/issues/I8WQTY
> mysql 6.5 I8WQUL:CVE-2024-20960<
https://gitee.com/src-openeuler/mysql/issues/I8WQUL
> mysql 6.5 I9KGKD:CVE-2023-6129<
https://gitee.com/src-openeuler/mysql/issues/I9KGKD
> mysql 6.5 I9E58K:CVE-2024-24795<
https://gitee.com/src-openeuler/httpd/issues/I9E58K
> httpd 6.1 I9JUKA:CVE-2022-48682<
https://gitee.com/src-openeuler/fdupes/issues/I9JUKA
> fdupes 6 I9EZL9:CVE-2024-2511<
https://gitee.com/src-openeuler/openssl/issues/I9EZL9
> openssl 5.9 I9AR03:CVE-2022-2806<
https://gitee.com/src-openeuler/sos/issues/I9AR03
> sos 5.5 I9LGC9:CVE-2024-34402<
https://gitee.com/src-openeuler/uriparser/issues/I9LGC9
> uriparser 5.5 I9EZYH:CVE-2024-31047<
https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH
> OpenEXR 5.5 I8XBI4:CVE-2024-0408<
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8XBI4
> xorg-x11-server-xwayland 5.5 I8WQU9:CVE-2024-20967<
https://gitee.com/src-openeuler/mysql/issues/I8WQU9
> mysql 5.5 I8WQXN:CVE-2024-20969<
https://gitee.com/src-openeuler/mysql/issues/I8WQXN
> mysql 5.5 I91L79:CVE-2024-25739<
https://gitee.com/src-openeuler/kernel/issues/I91L79
> kernel 5.5 I9BV23:CVE-2024-26644<
https://gitee.com/src-openeuler/kernel/issues/I9BV23
> kernel 5.5 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 5.5 I9E2M9:CVE-2024-26773<
https://gitee.com/src-openeuler/kernel/issues/I9E2M9
> kernel 5.5 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 5.5 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 5.5 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 5.5 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 5.5 I9E46I:CVE-2024-26788<
https://gitee.com/src-openeuler/kernel/issues/I9E46I
> kernel 5.5 I9HK1I:CVE-2024-26901<
https://gitee.com/src-openeuler/kernel/issues/I9HK1I
> kernel 5.5 I9HKBT:CVE-2024-26900<
https://gitee.com/src-openeuler/kernel/issues/I9HKBT
> kernel 5.5 I8WQRN:CVE-2024-20964<
https://gitee.com/src-openeuler/mysql/issues/I8WQRN
> mysql 5.3 I9H9UX:CVE-2024-20994<
https://gitee.com/src-openeuler/mysql/issues/I9H9UX
> mysql 5.3 I8WQRR:CVE-2024-20976<
https://gitee.com/src-openeuler/mysql/issues/I8WQRR
> mysql 4.9 I8WQRU:CVE-2024-20978<
https://gitee.com/src-openeuler/mysql/issues/I8WQRU
> mysql 4.9 I8WQRW:CVE-2024-20981<
https://gitee.com/src-openeuler/mysql/issues/I8WQRW
> mysql 4.9 I8WQSX:CVE-2024-20965<
https://gitee.com/src-openeuler/mysql/issues/I8WQSX
> mysql 4.9 I8WQT7:CVE-2024-20972<
https://gitee.com/src-openeuler/mysql/issues/I8WQT7
> mysql 4.9 I8WQTZ:CVE-2024-20982<
https://gitee.com/src-openeuler/mysql/issues/I8WQTZ
> mysql 4.9 I8WQU7:CVE-2024-20970<
https://gitee.com/src-openeuler/mysql/issues/I8WQU7
> mysql 4.9 I8WQUE:CVE-2024-20974<
https://gitee.com/src-openeuler/mysql/issues/I8WQUE
> mysql 4.9 I8WQUG:CVE-2024-20966<
https://gitee.com/src-openeuler/mysql/issues/I8WQUG
> mysql 4.9 I9H9TA:CVE-2024-21069<
https://gitee.com/src-openeuler/mysql/issues/I9H9TA
> mysql 4.9 I9H9TE:CVE-2024-21009<
https://gitee.com/src-openeuler/mysql/issues/I9H9TE
> mysql 4.9 I9H9TF:CVE-2024-21061<
https://gitee.com/src-openeuler/mysql/issues/I9H9TF
> mysql 4.9 I9H9TG:CVE-2024-20993<
https://gitee.com/src-openeuler/mysql/issues/I9H9TG
> mysql 4.9 I9H9TO:CVE-2024-21047<
https://gitee.com/src-openeuler/mysql/issues/I9H9TO
> mysql 4.9 I9H9TP:CVE-2024-20998<
https://gitee.com/src-openeuler/mysql/issues/I9H9TP
> mysql 4.9 I9H9TZ:CVE-2024-21055<
https://gitee.com/src-openeuler/mysql/issues/I9H9TZ
> mysql 4.9 I9H9V4:CVE-2024-21057<
https://gitee.com/src-openeuler/mysql/issues/I9H9V4
> mysql 4.9 I9H9U6:CVE-2024-21060<
https://gitee.com/src-openeuler/mysql/issues/I9H9U6
> mysql 4.9 I9H9UD:CVE-2024-21102<
https://gitee.com/src-openeuler/mysql/issues/I9H9UD
> mysql 4.9 I9H9UE:CVE-2024-21054<
https://gitee.com/src-openeuler/mysql/issues/I9H9UE
> mysql 4.9 I9H9UG:CVE-2024-21062<
https://gitee.com/src-openeuler/mysql/issues/I9H9UG
> mysql 4.9 I9H9VR:CVE-2024-21096<
https://gitee.com/src-openeuler/mysql/issues/I9H9VR
> mysql 4.9 I94UOT:CVE-2024-26607<
https://gitee.com/src-openeuler/kernel/issues/I94UOT
> kernel 4.7 I8WQUA:CVE-2024-20984<
https://gitee.com/src-openeuler/mysql/issues/I8WQUA
> mysql 4.4 I9H9U2:CVE-2024-21013<
https://gitee.com/src-openeuler/mysql/issues/I9H9U2
> mysql 4.4 I9H9UA:CVE-2024-21008<
https://gitee.com/src-openeuler/mysql/issues/I9H9UA
> mysql 4.4 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 4.4 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 4.4 I9H9T9:CVE-2024-21000<
https://gitee.com/src-openeuler/mysql/issues/I9H9T9
> mysql 3.8 I9FV3V:CVE-2024-3652<
https://gitee.com/src-openeuler/libreswan/issues/I9FV3V
> libreswan 3.5 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 3.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 3.3 I9FNF8:CVE-2021-47212<
https://gitee.com/src-openeuler/kernel/issues/I9FNF8
> kernel 1 I9GE8D:CVE-2024-26817<
https://gitee.com/src-openeuler/kernel/issues/I9GE8D
> kernel 1 I9HJPD:CVE-2024-26839<
https://gitee.com/src-openeuler/kernel/issues/I9HJPD
> kernel 1 I9HJU0:CVE-2024-26843<
https://gitee.com/src-openeuler/kernel/issues/I9HJU0
> kernel 1 I9HJVQ:CVE-2024-26840<
https://gitee.com/src-openeuler/kernel/issues/I9HJVQ
> kernel 1 I9HJVU:CVE-2023-52642<
https://gitee.com/src-openeuler/kernel/issues/I9HJVU
> kernel 1 I9HJZO:CVE-2024-26882<
https://gitee.com/src-openeuler/kernel/issues/I9HJZO
> kernel 1 I9HK2H:CVE-2024-26855<
https://gitee.com/src-openeuler/kernel/issues/I9HK2H
> kernel 1 I9HK5V:CVE-2024-26874<
https://gitee.com/src-openeuler/kernel/issues/I9HK5V
> kernel 1 I9HK63:CVE-2024-26894<
https://gitee.com/src-openeuler/kernel/issues/I9HK63
> kernel 1 I9HK8R:CVE-2024-26875<
https://gitee.com/src-openeuler/kernel/issues/I9HK8R
> kernel 1 I9HK9F:CVE-2024-26893<
https://gitee.com/src-openeuler/kernel/issues/I9HK9F
> kernel 1 I9F94L:CVE-2023-45935<
https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L
> qt5-qtbase 0 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 0 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 0 Bugfix: issue 仓库 #I6IAVJ:delete static library:delete static library ipset #I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog cdrkit #I9MLX3:TPCM功能问题:TPCM功能问题 shim #I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合 kernel #I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe() kernel openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 缺陷 2023/5/29 15:50 主要 src-openEuler/skopeo sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I795G3
2 openEuler-22.03-LTS-SP2 I7AAWF 2203-SP2下安装虚拟机,CPU为FT-2000+,使用host-model启动虚拟机失败 任务 2023/6/2 10:46 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7AAWF
3 openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 缺陷 2023/6/2 16:14 主要 src-openEuler/libkae sig-AccLib
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
4 openEuler-22.03-LTS-SP2 I7B6X5 gcc-pie-arm64架构和操作手册结果不同 缺陷 2023/6/6 10:11 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
5 openEuler-22.03-LTS-SP2 I7BRC1 perf 与 libtraceevent 软件包存在安装冲突 任务 2023/6/7 20:42 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I7BRC1
6 openEuler-22.03-LTS-SP2-update20231018 I89NB0 22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本 缺陷 2023/10/20 15:35 次要 src-openEuler/ceph sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
7 openEuler-22.03-LTS-SP2 I8C74L 实时补丁版本选择 任务 2023/10/31 9:53 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8C74L
8 openEuler-22.03-LTS-SP2 I9CODR 【openEuler-22.03-LTS-SP2】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:53 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CODR
openEuler-20.03-LTS-SP4 Update 20240508 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题13个,已知漏洞75个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTL?from=project-i…
CVE修复: CVE 仓库 score I8VT5F:CVE-2023-51698<
https://gitee.com/src-openeuler/atril/issues/I8VT5F
> atril 8.8 I4BY7B:CVE-2020-26950<
https://gitee.com/src-openeuler/firefox/issues/I4BY7B
> firefox 8.8 I9FNG2:CVE-2021-47194<
https://gitee.com/src-openeuler/kernel/issues/I9FNG2
> kernel 7.8 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 7.8 I9HKCB:CVE-2024-26883<
https://gitee.com/src-openeuler/kernel/issues/I9HKCB
> kernel 7.8 I9L9FT:CVE-2024-4340<
https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT
> python-sqlparse 7.5 I9ENQO:CVE-2020-36829<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO
> perl-Mojolicious 7.5 I9ENQW:CVE-2021-47208<
https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW
> perl-Mojolicious 7.5 I9E2Q0:CVE-2024-27316<
https://gitee.com/src-openeuler/httpd/issues/I9E2Q0
> httpd 7.5 I9DS2T:CVE-2024-3205<
https://gitee.com/src-openeuler/libyaml/issues/I9DS2T
> libyaml 7.3 I9GEXT:CVE-2024-32487<
https://gitee.com/src-openeuler/less/issues/I9GEXT
> less 6.8 I9J6JG:CVE-2020-35850<
https://gitee.com/src-openeuler/cockpit/issues/I9J6JG
> cockpit 6.5 I9E58K:CVE-2024-24795<
https://gitee.com/src-openeuler/httpd/issues/I9E58K
> httpd 6.1 I9E577:CVE-2023-38709<
https://gitee.com/src-openeuler/httpd/issues/I9E577
> httpd 6.1 I9JUKA:CVE-2022-48682<
https://gitee.com/src-openeuler/fdupes/issues/I9JUKA
> fdupes 6 I9EZL9:CVE-2024-2511<
https://gitee.com/src-openeuler/openssl/issues/I9EZL9
> openssl 5.9 I9AR03:CVE-2022-2806<
https://gitee.com/src-openeuler/sos/issues/I9AR03
> sos 5.5 I9LGC9:CVE-2024-34402<
https://gitee.com/src-openeuler/uriparser/issues/I9LGC9
> uriparser 5.5 I9LGCZ:CVE-2024-34403<
https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ
> uriparser 5.5 I9EZYH:CVE-2024-31047<
https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH
> OpenEXR 5.5 I99JQV:CVE-2023-52619<
https://gitee.com/src-openeuler/kernel/issues/I99JQV
> kernel 5.5 I9BGKK:CVE-2021-47149<
https://gitee.com/src-openeuler/kernel/issues/I9BGKK
> kernel 5.5 I9BV23:CVE-2024-26644<
https://gitee.com/src-openeuler/kernel/issues/I9BV23
> kernel 5.5 I9E2M9:CVE-2024-26773<
https://gitee.com/src-openeuler/kernel/issues/I9E2M9
> kernel 5.5 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 5.5 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 5.5 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 5.5 I9HOEF:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
> kernel 5.5 I9LK3Y:CVE-2022-48674<
https://gitee.com/src-openeuler/kernel/issues/I9LK3Y
> kernel 5.5 I9HK1I:CVE-2024-26901<
https://gitee.com/src-openeuler/kernel/issues/I9HK1I
> kernel 5.5 I9HK4U:CVE-2024-26904<
https://gitee.com/src-openeuler/kernel/issues/I9HK4U
> kernel 5.5 I917MX:CVE-2024-24860<
https://gitee.com/src-openeuler/kernel/issues/I917MX
> kernel 5.3 I990B2:CVE-2021-47121<
https://gitee.com/src-openeuler/kernel/issues/I990B2
> kernel 4.7 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 4.4 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 4.4 I9JQRC:CVE-2024-33602<
https://gitee.com/src-openeuler/glibc/issues/I9JQRC
> glibc 4 I9FV3V:CVE-2024-3652<
https://gitee.com/src-openeuler/libreswan/issues/I9FV3V
> libreswan 3.5 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 3.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 3.3 I9E6TQ:CVE-2024-26813<
https://gitee.com/src-openeuler/kernel/issues/I9E6TQ
> kernel 1 I9GE8D:CVE-2024-26817<
https://gitee.com/src-openeuler/kernel/issues/I9GE8D
> kernel 1 I9HJPD:CVE-2024-26839<
https://gitee.com/src-openeuler/kernel/issues/I9HJPD
> kernel 1 I9HJQC:CVE-2024-26845<
https://gitee.com/src-openeuler/kernel/issues/I9HJQC
> kernel 1 I9HJRD:CVE-2024-26828<
https://gitee.com/src-openeuler/kernel/issues/I9HJRD
> kernel 1 I9HJUW:CVE-2024-26825<
https://gitee.com/src-openeuler/kernel/issues/I9HJUW
> kernel 1 I9HJVQ:CVE-2024-26840<
https://gitee.com/src-openeuler/kernel/issues/I9HJVQ
> kernel 1 I9HJVU:CVE-2023-52642<
https://gitee.com/src-openeuler/kernel/issues/I9HJVU
> kernel 1 I9HJX7:CVE-2024-26878<
https://gitee.com/src-openeuler/kernel/issues/I9HJX7
> kernel 1 I9HJXK:CVE-2024-26863<
https://gitee.com/src-openeuler/kernel/issues/I9HJXK
> kernel 1 I9HJXV:CVE-2024-26880<
https://gitee.com/src-openeuler/kernel/issues/I9HJXV
> kernel 1 I9HJZO:CVE-2024-26882<
https://gitee.com/src-openeuler/kernel/issues/I9HJZO
> kernel 1 I9HK5V:CVE-2024-26874<
https://gitee.com/src-openeuler/kernel/issues/I9HK5V
> kernel 1 I9HK63:CVE-2024-26894<
https://gitee.com/src-openeuler/kernel/issues/I9HK63
> kernel 1 I9HK8R:CVE-2024-26875<
https://gitee.com/src-openeuler/kernel/issues/I9HK8R
> kernel 1 I9HK8Y:CVE-2024-26872<
https://gitee.com/src-openeuler/kernel/issues/I9HK8Y
> kernel 1 I9HK9B:CVE-2024-26857<
https://gitee.com/src-openeuler/kernel/issues/I9HK9B
> kernel 1 I9HK9J:CVE-2024-26859<
https://gitee.com/src-openeuler/kernel/issues/I9HK9J
> kernel 1 I9HK9R:CVE-2024-26852<
https://gitee.com/src-openeuler/kernel/issues/I9HK9R
> kernel 1 I9HKAZ:CVE-2024-26851<
https://gitee.com/src-openeuler/kernel/issues/I9HKAZ
> kernel 1 I9HKEE:CVE-2024-26876<
https://gitee.com/src-openeuler/kernel/issues/I9HKEE
> kernel 1 I9HL6R:CVE-2024-26915<
https://gitee.com/src-openeuler/kernel/issues/I9HL6R
> kernel 1 I9J3KG:CVE-2024-26922<
https://gitee.com/src-openeuler/kernel/issues/I9J3KG
> kernel 1 I9J7N6:CVE-2024-26813<
https://gitee.com/src-openeuler/kernel/issues/I9J7N6
> kernel 1 I9JFG0:CVE-2024-26923<
https://gitee.com/src-openeuler/kernel/issues/I9JFG0
> kernel 1 I9JJ2F:CVE-2024-26926<
https://gitee.com/src-openeuler/kernel/issues/I9JJ2F
> kernel 1 I9KHGY:CVE-2022-48664<
https://gitee.com/src-openeuler/kernel/issues/I9KHGY
> kernel 1 I9L5IQ:CVE-2024-26993<
https://gitee.com/src-openeuler/kernel/issues/I9L5IQ
> kernel 1 I9L5QJ:CVE-2024-26973<
https://gitee.com/src-openeuler/kernel/issues/I9L5QJ
> kernel 1 I9LKE1:CVE-2022-48702<
https://gitee.com/src-openeuler/kernel/issues/I9LKE1
> kernel 1 I9F94L:CVE-2023-45935<
https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L
> qt5-qtbase 0 I9FNFF:CVE-2021-47183<
https://gitee.com/src-openeuler/kernel/issues/I9FNFF
> kernel 0 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 0 I9FNFO:CVE-2021-47217<
https://gitee.com/src-openeuler/kernel/issues/I9FNFO
> kernel 0 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 0 I9FNFL:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9FNFL
> kernel 0 Bugfix: issue 仓库 #I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog cdrkit #I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行 pesign #I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合 httpd #I9ER36:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58 kernel #I9GV9R:【openeuler-1.0-lts】网络lts 4.19.308补丁回合:【openeuler-1.0-lts】网络lts 4.19.308补丁回合 kernel #I9HSOM:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup kernel #I9IPML:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock kernel #I9J08D:【OLK-5.10】多PF并发创建VF时间变长:【OLK-5.10】多PF并发创建VF时间变长 kernel #I9JNPZ:【OLK-5.10】 4月主线补丁分析回合:【OLK-5.10】 4月主线补丁分析回合 kernel #I9K34B:sched/rt: Fix sysctl_sched_rr_timeslice intial value:sched/rt: Fix sysctl_sched_rr_timeslice intial value kernel #I9K4H3:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset kernel #I9K4JZ:sched/rt: Disallow writing invalid values to sched_rt_period_us:sched/rt: Disallow writing invalid values to sched_rt_period_us kernel #I9K8XT:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error kernel openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-20.03-LTS-SP4-alpha I8B7XU 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 缺陷 2023/10/26 19:02 主要 src-openEuler/vdsm oVirt
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
2 openEuler-20.03-LTS-SP4-round-1 I8DT5M 【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败 缺陷 2023/11/4 17:34 主要 src-openEuler/redis6 bigdata
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
3 openEuler-20.03-LTS-SP4 release I8EAHA [20.03-lts-sp4]Support handle CXL devices AER errors in firmware-first mode 任务 2023/11/6 22:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8EAHA
4 openEuler-20.03-LTS-SP4-round-1 I8EKUI 【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败 缺陷 2023/11/7 17:23 主要 src-openEuler/strongswan sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
5 openEuler-20.03-LTS-SP4 release I8F7ZR [20.03-lts-sp4]The Hisi SAS driver supports the MQ feature 任务 2023/11/9 17:03 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F7ZR
6 openEuler-20.03-LTS-SP4 release I8F80L [20.03-lts-sp4]The Hisi SAS driver supports loopback bit stream 任务 2023/11/9 17:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F80L
7 openEuler-20.03-LTS-SP4-round-2 I8G371 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 缺陷 2023/11/13 16:59 次要 src-openEuler/h2 DB
https://gitee.com/open_euler/dashboard?issue_id=I8G371
8 openEuler-20.03-LTS-SP4-round-2 I8GDGR 【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住 缺陷 2023/11/14 15:36 主要 src-openEuler/gnome-desktop3 GNOME
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
9 openEuler-20.03-LTS-SP4-dailybuild I8GUMP [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything 缺陷 2023/11/16 9:18 不重要 src-openEuler/nagios-plugins Networking
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
10 openEuler-20.03-LTS-SP4-dailybuild I8I8DQ [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol 缺陷 2023/11/21 15:31 不重要 src-openEuler/caja-extensions sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240508 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题24个,已知漏洞122个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MAU2?from=project-i…
CVE修复: CVE 仓库 score #I8VT5F:CVE-2023-51698<
https://gitee.com/open_euler/dashboard?issue_id=I8VT5F
> atril 8.8 #I8XH1F:CVE-2023-6816<
https://gitee.com/open_euler/dashboard?issue_id=I8XH1F
> xorg-x11-server-xwayland 7.8 #I9HJY0:CVE-2024-26898<
https://gitee.com/open_euler/dashboard?issue_id=I9HJY0
> kernel 7.8 #I9HK1R:CVE-2024-26885<
https://gitee.com/open_euler/dashboard?issue_id=I9HK1R
> kernel 7.8 #I9HK6L:CVE-2024-26907<
https://gitee.com/open_euler/dashboard?issue_id=I9HK6L
> kernel 7.8 #I9HK6X:CVE-2024-26884<
https://gitee.com/open_euler/dashboard?issue_id=I9HK6X
> kernel 7.8 #I9HKCB:CVE-2024-26883<
https://gitee.com/open_euler/dashboard?issue_id=I9HKCB
> kernel 7.8 #I90BQX:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BQX
> skopeo 7.5 #I90BS5:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BS5
> ignition 7.5 #I9C6X6:CVE-2022-32149<
https://gitee.com/open_euler/dashboard?issue_id=I9C6X6
> podman 7.5 #I9E2Q0:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Q0
> httpd 7.5 #I8YZNS:CVE-2023-6478<
https://gitee.com/open_euler/dashboard?issue_id=I8YZNS
> xorg-x11-server-xwayland 7.5 #I9J3YK:CVE-2024-32661<
https://gitee.com/open_euler/dashboard?issue_id=I9J3YK
> freerdp 7.5 #I9E4N7:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N7
> xorg-x11-server-xwayland 7.3 #I9HWXO:CVE-2023-3758<
https://gitee.com/open_euler/dashboard?issue_id=I9HWXO
> sssd 7.1 #I8WQRS:CVE-2024-20973<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRS
> mysql 6.5 #I8WQRY:CVE-2024-20962<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRY
> mysql 6.5 #I8WQRZ:CVE-2024-20977<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRZ
> mysql 6.5 #I8WQS2:CVE-2024-20963<
https://gitee.com/open_euler/dashboard?issue_id=I8WQS2
> mysql 6.5 #I8WQVV:CVE-2024-20985<
https://gitee.com/open_euler/dashboard?issue_id=I8WQVV
> mysql 6.5 #I8WQTY:CVE-2024-20961<
https://gitee.com/open_euler/dashboard?issue_id=I8WQTY
> mysql 6.5 #I8WQUL:CVE-2024-20960<
https://gitee.com/open_euler/dashboard?issue_id=I8WQUL
> mysql 6.5 #I9KGKD:CVE-2023-6129<
https://gitee.com/open_euler/dashboard?issue_id=I9KGKD
> mysql 6.5 #I9E58K:CVE-2024-24795<
https://gitee.com/open_euler/dashboard?issue_id=I9E58K
> httpd 6.1 #I9E577:CVE-2023-38709<
https://gitee.com/open_euler/dashboard?issue_id=I9E577
> httpd 6.1 #I9JUKA:CVE-2022-48682<
https://gitee.com/open_euler/dashboard?issue_id=I9JUKA
> fdupes 6 #I9EZL9:CVE-2024-2511<
https://gitee.com/open_euler/dashboard?issue_id=I9EZL9
> openssl 5.9 #I9AR03:CVE-2022-2806<
https://gitee.com/open_euler/dashboard?issue_id=I9AR03
> sos 5.5 #I8XBI4:CVE-2024-0408<
https://gitee.com/open_euler/dashboard?issue_id=I8XBI4
> xorg-x11-server-xwayland 5.5 #I8WQU9:CVE-2024-20967<
https://gitee.com/open_euler/dashboard?issue_id=I8WQU9
> mysql 5.5 #I8WQXN:CVE-2024-20969<
https://gitee.com/open_euler/dashboard?issue_id=I8WQXN
> mysql 5.5 #I91L79:CVE-2024-25739<
https://gitee.com/open_euler/dashboard?issue_id=I91L79
> kernel 5.5 #I99JQV:CVE-2023-52619<
https://gitee.com/open_euler/dashboard?issue_id=I99JQV
> kernel 5.5 #I9BV23:CVE-2024-26644<
https://gitee.com/open_euler/dashboard?issue_id=I9BV23
> kernel 5.5 #I9E2GU:CVE-2024-26698<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GU
> kernel 5.5 #I9E2M9:CVE-2024-26773<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M9
> kernel 5.5 #I9E2MF:CVE-2024-26772<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MF
> kernel 5.5 #I9E2MG:CVE-2024-26777<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MG
> kernel 5.5 #I9E2Y8:CVE-2024-26778<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8
> kernel 5.5 #I9E3E9:CVE-2024-26736<
https://gitee.com/open_euler/dashboard?issue_id=I9E3E9
> kernel 5.5 #I9E46I:CVE-2024-26788<
https://gitee.com/open_euler/dashboard?issue_id=I9E46I
> kernel 5.5 #I9LK3Y:CVE-2022-48674<
https://gitee.com/open_euler/dashboard?issue_id=I9LK3Y
> kernel 5.5 #I9FNET:CVE-2021-47193<
https://gitee.com/open_euler/dashboard?issue_id=I9FNET
> kernel 5.5 #I9HK1I:CVE-2024-26901<
https://gitee.com/open_euler/dashboard?issue_id=I9HK1I
> kernel 5.5 #I9HK4U:CVE-2024-26904<
https://gitee.com/open_euler/dashboard?issue_id=I9HK4U
> kernel 5.5 #I9HKBT:CVE-2024-26900<
https://gitee.com/open_euler/dashboard?issue_id=I9HKBT
> kernel 5.5 #I8WQRN:CVE-2024-20964<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRN
> mysql 5.3 #I9H9UX:CVE-2024-20994<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UX
> mysql 5.3 #I917MX:CVE-2024-24860<
https://gitee.com/open_euler/dashboard?issue_id=I917MX
> kernel 5.3 #I8WQRQ:CVE-2024-20971<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRQ
> mysql 4.9 #I8WQRR:CVE-2024-20976<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRR
> mysql 4.9 #I8WQRU:CVE-2024-20978<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRU
> mysql 4.9 #I8WQRW:CVE-2024-20981<
https://gitee.com/open_euler/dashboard?issue_id=I8WQRW
> mysql 4.9 #I8WQSX:CVE-2024-20965<
https://gitee.com/open_euler/dashboard?issue_id=I8WQSX
> mysql 4.9 #I8WQT7:CVE-2024-20972<
https://gitee.com/open_euler/dashboard?issue_id=I8WQT7
> mysql 4.9 #I8WQTZ:CVE-2024-20982<
https://gitee.com/open_euler/dashboard?issue_id=I8WQTZ
> mysql 4.9 #I8WQU7:CVE-2024-20970<
https://gitee.com/open_euler/dashboard?issue_id=I8WQU7
> mysql 4.9 #I8WQUE:CVE-2024-20974<
https://gitee.com/open_euler/dashboard?issue_id=I8WQUE
> mysql 4.9 #I8WQUG:CVE-2024-20966<
https://gitee.com/open_euler/dashboard?issue_id=I8WQUG
> mysql 4.9 #I9H9TA:CVE-2024-21069<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TA
> mysql 4.9 #I9H9TE:CVE-2024-21009<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TE
> mysql 4.9 #I9H9TF:CVE-2024-21061<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TF
> mysql 4.9 #I9H9TG:CVE-2024-20993<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TG
> mysql 4.9 #I9H9TO:CVE-2024-21047<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TO
> mysql 4.9 #I9H9TP:CVE-2024-20998<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TP
> mysql 4.9 #I9H9TZ:CVE-2024-21055<
https://gitee.com/open_euler/dashboard?issue_id=I9H9TZ
> mysql 4.9 #I9H9V4:CVE-2024-21057<
https://gitee.com/open_euler/dashboard?issue_id=I9H9V4
> mysql 4.9 #I9H9U6:CVE-2024-21060<
https://gitee.com/open_euler/dashboard?issue_id=I9H9U6
> mysql 4.9 #I9H9UD:CVE-2024-21102<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UD
> mysql 4.9 #I9H9UE:CVE-2024-21054<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UE
> mysql 4.9 #I9H9UG:CVE-2024-21062<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UG
> mysql 4.9 #I9H9VR:CVE-2024-21096<
https://gitee.com/open_euler/dashboard?issue_id=I9H9VR
> mysql 4.9 #I94UOT:CVE-2024-26607<
https://gitee.com/open_euler/dashboard?issue_id=I94UOT
> kernel 4.7 #I8WQUA:CVE-2024-20984<
https://gitee.com/open_euler/dashboard?issue_id=I8WQUA
> mysql 4.4 #I9H9U2:CVE-2024-21013<
https://gitee.com/open_euler/dashboard?issue_id=I9H9U2
> mysql 4.4 #I9H9UA:CVE-2024-21008<
https://gitee.com/open_euler/dashboard?issue_id=I9H9UA
> mysql 4.4 #I9E6TS:CVE-2024-26810<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TS
> kernel 4.4 #I9E6TU:CVE-2024-27437<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TU
> kernel 4.4 #I9E6TH:CVE-2024-26814<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TH
> kernel 4.4 #I9H9T9:CVE-2024-21000<
https://gitee.com/open_euler/dashboard?issue_id=I9H9T9
> mysql 3.8 #I9FV3V:CVE-2024-3652<
https://gitee.com/open_euler/dashboard?issue_id=I9FV3V
> libreswan 3.5 #I9E2O0:CVE-2024-26751<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O0
> kernel 3.3 #I9E2O3:CVE-2024-26764<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O3
> kernel 3.3 #I9E6TQ:CVE-2024-26813<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TQ
> kernel 1 #I9GE8D:CVE-2024-26817<
https://gitee.com/open_euler/dashboard?issue_id=I9GE8D
> kernel 1 #I9HJP4:CVE-2024-26829<
https://gitee.com/open_euler/dashboard?issue_id=I9HJP4
> kernel 1 #I9HJPD:CVE-2024-26839<
https://gitee.com/open_euler/dashboard?issue_id=I9HJPD
> kernel 1 #I9HJQC:CVE-2024-26845<
https://gitee.com/open_euler/dashboard?issue_id=I9HJQC
> kernel 1 #I9HJRD:CVE-2024-26828<
https://gitee.com/open_euler/dashboard?issue_id=I9HJRD
> kernel 1 #I9HJSI:CVE-2024-26846<
https://gitee.com/open_euler/dashboard?issue_id=I9HJSI
> kernel 1 #I9HJU0:CVE-2024-26843<
https://gitee.com/open_euler/dashboard?issue_id=I9HJU0
> kernel 1 #I9HJUW:CVE-2024-26825<
https://gitee.com/open_euler/dashboard?issue_id=I9HJUW
> kernel 1 #I9HJVQ:CVE-2024-26840<
https://gitee.com/open_euler/dashboard?issue_id=I9HJVQ
> kernel 1 #I9HJVU:CVE-2023-52642<
https://gitee.com/open_euler/dashboard?issue_id=I9HJVU
> kernel 1 #I9HJXK:CVE-2024-26863<
https://gitee.com/open_euler/dashboard?issue_id=I9HJXK
> kernel 1 #I9HJXV:CVE-2024-26880<
https://gitee.com/open_euler/dashboard?issue_id=I9HJXV
> kernel 1 #I9HJZO:CVE-2024-26882<
https://gitee.com/open_euler/dashboard?issue_id=I9HJZO
> kernel 1 #I9HK2H:CVE-2024-26855<
https://gitee.com/open_euler/dashboard?issue_id=I9HK2H
> kernel 1 #I9HK5V:CVE-2024-26874<
https://gitee.com/open_euler/dashboard?issue_id=I9HK5V
> kernel 1 #I9HK63:CVE-2024-26894<
https://gitee.com/open_euler/dashboard?issue_id=I9HK63
> kernel 1 #I9HK6R:CVE-2024-26862<
https://gitee.com/open_euler/dashboard?issue_id=I9HK6R
> kernel 1 #I9HK78:CVE-2024-26870<
https://gitee.com/open_euler/dashboard?issue_id=I9HK78
> kernel 1 #I9HK8R:CVE-2024-26875<
https://gitee.com/open_euler/dashboard?issue_id=I9HK8R
> kernel 1 #I9HK8Y:CVE-2024-26872<
https://gitee.com/open_euler/dashboard?issue_id=I9HK8Y
> kernel 1 #I9HK9F:CVE-2024-26893<
https://gitee.com/open_euler/dashboard?issue_id=I9HK9F
> kernel 1 #I9HK9J:CVE-2024-26859<
https://gitee.com/open_euler/dashboard?issue_id=I9HK9J
> kernel 1 #I9HK9R:CVE-2024-26852<
https://gitee.com/open_euler/dashboard?issue_id=I9HK9R
> kernel 1 #I9HKBX:CVE-2024-26896<
https://gitee.com/open_euler/dashboard?issue_id=I9HKBX
> kernel 1 #I9HKE5:CVE-2024-26869<
https://gitee.com/open_euler/dashboard?issue_id=I9HKE5
> kernel 1 #I9HVTH:CVE-2024-26921<
https://gitee.com/open_euler/dashboard?issue_id=I9HVTH
> kernel 1 #I9J3KG:CVE-2024-26922<
https://gitee.com/open_euler/dashboard?issue_id=I9J3KG
> kernel 1 #I9JFG0:CVE-2024-26923<
https://gitee.com/open_euler/dashboard?issue_id=I9JFG0
> kernel 1 #I9JJ2F:CVE-2024-26926<
https://gitee.com/open_euler/dashboard?issue_id=I9JJ2F
> kernel 1 #I9L5IQ:CVE-2024-26993<
https://gitee.com/open_euler/dashboard?issue_id=I9L5IQ
> kernel 1 #I9L5KR:CVE-2024-26999<
https://gitee.com/open_euler/dashboard?issue_id=I9L5KR
> kernel 1 #I9L5QJ:CVE-2024-26973<
https://gitee.com/open_euler/dashboard?issue_id=I9L5QJ
> kernel 1 #I9L9J6:CVE-2024-27075<
https://gitee.com/open_euler/dashboard?issue_id=I9L9J6
> kernel 1 #I9L9OA:CVE-2023-52650<
https://gitee.com/open_euler/dashboard?issue_id=I9L9OA
> kernel 1 #I91OJD:CVE-2024-25580<
https://gitee.com/open_euler/dashboard?issue_id=I91OJD
> qt5-qtbase 0 #I9F94L:CVE-2023-45935<
https://gitee.com/open_euler/dashboard?issue_id=I9F94L
> qt5-qtbase 0 #I9FNFK:CVE-2021-47182<
https://gitee.com/open_euler/dashboard?issue_id=I9FNFK
> kernel 0 #I9FNFQ:CVE-2021-47211<
https://gitee.com/open_euler/dashboard?issue_id=I9FNFQ
> kernel 0 Bugfix: issue 仓库 #I6IAVJ:delete static library<
https://gitee.com/open_euler/dashboard?issue_id=I6IAVJ
> ipset #I8S3VP:cdrkit: delete autosetup macro in changelog<
https://gitee.com/open_euler/dashboard?issue_id=I8S3VP
> cdrkit #I9ML16:1.22及以上版本,在遇到一些内置类型时生成btf会出现报错<
https://gitee.com/open_euler/dashboard?issue_id=I9ML16
> dwarves #I9GURX:httpd社区补丁分析回合<
https://gitee.com/open_euler/dashboard?issue_id=I9GURX
> httpd #I9E58K:CVE-2024-24795<
https://gitee.com/open_euler/dashboard?issue_id=I9E58K
> httpd #I9E577:CVE-2023-38709<
https://gitee.com/open_euler/dashboard?issue_id=I9E577
> httpd #I9E2Q0:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Q0
> httpd #I9MLX3:TPCM功能问题<
https://gitee.com/open_euler/dashboard?issue_id=I9MLX3
> shim #I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<
https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ
> kernel #I99GLS:【OpenEuler22.03-LTS-SP4】HNS3驱动新增对全新设备的支持&支持新Link层<
https://gitee.com/open_euler/dashboard?issue_id=I99GLS
> kernel #I9CC0X:【OLK-5.10】add support for arm virtcca vm<
https://gitee.com/open_euler/dashboard?issue_id=I9CC0X
> kernel #I9CK0O:【OLK-6.6】支持 hns roce DCA 模式<
https://gitee.com/open_euler/dashboard?issue_id=I9CK0O
> kernel #I9E9HL:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性user_ctrl功能优化<
https://gitee.com/open_euler/dashboard?issue_id=I9E9HL
> kernel #I9ER2W:【olk - 5.10】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58<
https://gitee.com/open_euler/dashboard?issue_id=I9ER2W
> kernel #I9FAYN:[OLK 5.10] RDMA/hns: Fix incorrect iteration number of DCA umem sg entries and error return in hns_roce_v2_modify_srq()<
https://gitee.com/open_euler/dashboard?issue_id=I9FAYN
> kernel #I9GVYW:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support<
https://gitee.com/open_euler/dashboard?issue_id=I9GVYW
> kernel #I9H643:【OLK-5.10】增加华为智能网卡RDMA驱动<
https://gitee.com/open_euler/dashboard?issue_id=I9H643
> kernel #I9J08D:【OLK-5.10】多PF并发创建VF时间变长<
https://gitee.com/open_euler/dashboard?issue_id=I9J08D
> kernel #I9J4PL:Backport 5.10.204 LTS patches from upstream<
https://gitee.com/open_euler/dashboard?issue_id=I9J4PL
> kernel #I9JNPZ:【OLK-5.10】 4月主线补丁分析回合<
https://gitee.com/open_euler/dashboard?issue_id=I9JNPZ
> kernel #I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合<
https://gitee.com/open_euler/dashboard?issue_id=I9JPDJ
> kernel #I9JPUP:Backport 5.10.205 LTS patches from upstream<
https://gitee.com/open_euler/dashboard?issue_id=I9JPUP
> kernel #I9K8D1:自研补丁推送openeuler社区<
https://gitee.com/open_euler/dashboard?issue_id=I9K8D1
> kernel #I9MMNG:【OLK-5.10】 主线补丁分析回合<
https://gitee.com/open_euler/dashboard?issue_id=I9MMNG
> kernel openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示: 序号 里程碑 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 openEuler-22.03-LTS-SP3 I96ID7 [22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp 缺陷 2024/3/7 9:35 主要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
2 openEuler-22.03-LTS-SP3 I9AF9S 【22.03 LTS SP3】【arm/x86】openmpi相关命令执行失败 缺陷 2024/3/21 16:24 次要 src-openEuler/openmpi Application
https://gitee.com/open_euler/dashboard?issue_id=I9AF9S
3 openEuler-22.03-LTS-SP3 I9AFKH 【22.03 LTS SP3】【arm/x86】su - amandabackup -c "amdump_client --config DailySet1 list" 失败 缺陷 2024/3/21 16:39 次要 src-openEuler/amanda Application
https://gitee.com/open_euler/dashboard?issue_id=I9AFKH
4 openEuler-22.03-LTS-SP3 I9COG1 【openEuler-22.03-LTS-SP3】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch” 缺陷 2024/3/29 14:58 主要 src-openEuler/clang Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9COG1
5 openEuler-22.03-LTS-SP3 I9KPF6 [22.03-LTS-SP3][deja]-floop-crc特性deja相关用例报错 缺陷 2024/4/29 16:32 次要 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9KPF6
社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(5.10日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG issue码云链接 CVE-2022-41723 I90BQX 0.0 7.5 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I90BQX
CVE-2024-26814 I9E6TH 2.14 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E6TH
CVE-2024-26809 I9E4AC 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E4AC
CVE-2024-26808 I9E49K 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E49K
CVE-2024-26804 I9E47C 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E47C
CVE-2024-26805 I9E46W 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46W
CVE-2024-26790 I9E46Q 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46Q
CVE-2024-26801 I9E46O 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46O
CVE-2024-26792 I9E46G 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46G
CVE-2024-26787 I9E461 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E461
CVE-2024-26793 I9E451 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E451
CVE-2024-26798 I9E448 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E448
CVE-2024-26782 I9E442 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E442
CVE-2024-26744 I9E3EE 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E3EE
CVE-2024-26735 I9E3E4 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E3E4
CVE-2024-26747 I9E2O4 2.14 4.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2O4
CVE-2024-26776 I9E2NX 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2NX
CVE-2024-26749 I9E2NW 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2NW
CVE-2024-26748 I9E2MS 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MS
CVE-2024-26774 I9E2MQ 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MQ
CVE-2024-26769 I9E2MJ 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MJ
CVE-2024-26754 I9E2MH 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MH
CVE-2024-26733 I9E2MB 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MB
CVE-2024-26743 I9E2M7 2.14 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2M7
CVE-2023-52641 I9E2M0 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2M0
CVE-2024-26739 I9E2LZ 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LZ
CVE-2024-26763 I9E2LW 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LW
CVE-2024-26740 I9E2LT 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LT
CVE-2023-52637 I9E2H0 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2H0
CVE-2023-52638 I9E2GX 2.14 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GX
CVE-2022-40523 I9GEWN 3.28 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GEWN
CVE-2022-48655 I9KHI4 4.28 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9KHI4
CVE-2024-26907 I9HK6L 4.28 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK6L
CVE-2024-26898 I9HJY0 4.28 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HJY0
CVE-2024-24863 I9GHPY 4.28 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GHPY
CVE-2024-24862 I9GHPV 4.28 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GHPV
CVE-2023-52623 I9BV4V 4.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4V
CVE-2023-52621 I9BV4S 4.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4S
CVE-2023-52627 I9BV4R 4.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4R
CVE-2024-26646 I9BV4D 4.78 4.9 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4D
CVE-2024-26645 I9BV24 4.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV24
CVE-2024-26643 I9AK7L 4.78 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK7L
CVE-2023-52620 I9AK6C 4.78 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK6C
CVE-2024-26642 I9AK56 4.78 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK56
CVE-2024-32980 I9NN4A 5.28 9.1 perl-version sig-perl-modules
https://gitee.com/src-openeuler/perl-version/issues/I9NN4A
CVE-2023-44431 I9LH30 7.28 7.1 bluez Base-service
https://gitee.com/src-openeuler/bluez/issues/I9LH30
CVE-2024-24856 I9HIEG 7.28 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HIEG
CVE-2024-21085 I9H9VN 7.28 3.7 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
CVE-2024-21094 I9H9UK 7.28 3.7 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
CVE-2024-21011 I9H9UI 7.28 3.7 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
CVE-2024-21068 I9H9U3 7.28 3.7 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
CVE-2024-21004 I9H9TR 7.28 2.5 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9TR
CVE-2024-21003 I9H9T8 7.28 3.1 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9T8
CVE-2024-21012 I9H9SG 7.28 3.7 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9SG
CVE-2024-21002 I9H9SF 7.28 2.5 openjdk-1.8.0 Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9SF
CVE-2021-47210 I9HOEF 7.61 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
CVE-2024-21012 I9HP9P 8.28 3.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP9P
CVE-2024-21094 I9HP9L 8.28 3.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP9L
CVE-2024-21085 I9HP43 8.28 3.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP43
CVE-2024-21011 I9HP38 8.28 3.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP38
CVE-2024-21068 I9HOZZ 8.28 3.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HOZZ
CVE-2024-3651 I9GOTV 9.62 6.5 python-idna Networking
https://gitee.com/src-openeuler/python-idna/issues/I9GOTV
CVE-2023-28100 I9AVQ9 10.14 6.5 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-28101 I9AVQ7 10.14 4.3 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2021-47195 I9FNFV 10.28 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNFV
CVE-2023-52639 I9E2GQ 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GQ
CVE-2024-26706 I9E2GP 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GP
CVE-2024-26689 I9E2GN 11.78 6.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GN
CVE-2024-26712 I9E2FQ 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FQ
CVE-2024-26685 I9E2FP 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FP
CVE-2024-26707 I9E2FK 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FK
CVE-2024-26697 I9E2FH 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FH
CVE-2024-26702 I9E2FC 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FC
CVE-2024-26726 I9E2F7 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F7
CVE-2024-26719 I9E2F5 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F5
CVE-2024-26688 I9E2F0 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F0
CVE-2024-26686 I9E2EL 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EL
CVE-2024-26722 I9E2EF 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EF
CVE-2024-26720 I9E2EC 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EC
CVE-2024-26671 I9DO35 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DO35
CVE-2024-26684 I9DNZK 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNZK
CVE-2023-52631 I9DNXE 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNXE
CVE-2024-26665 I9DNVF 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNVF
CVE-2023-52633 I9DNRR 11.78 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNRR
CVE-2024-26679 I9DNRC 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNRC
CVE-2024-26659 I9DNQ5 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNQ5
CVE-2024-26668 I9DNPD 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNPD
CVE-2024-26680 I9DNMI 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNMI
CVE-2024-26673 I9DNKQ 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNKQ
CVE-2024-26669 I9DNKF 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNKF
CVE-2024-26675 I9DNIJ 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNIJ
CVE-2024-26664 I9DNHE 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNHE
CVE-2023-52635 I9DNGK 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNGK
CVE-2024-26661 I9DNF6 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNF6
CVE-2023-52630 I9DNCI 11.78 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNCI
CVE-2024-2746 I9NBRE 12.28 8.8 dbus Base-service
https://gitee.com/src-openeuler/dbus/issues/I9NBRE
CVE-2024-28180 I9IN8W 12.28 4.3 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9IN8W
CVE-2024-3661 I9NNC2 13.28 7.6 dhcp Networking
https://gitee.com/src-openeuler/dhcp/issues/I9NNC2
社区关键组件待修复缺陷: openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。 社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑): 序号 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 I8A77R Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01] 任务 2023/10/23 16:22 无优先级 src-openEuler/alsa-lib Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
2 I8ON5A Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13] 任务 2023/12/15 11:04 无优先级 src-openEuler/cronie Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
3 I6TQ8W curl命令向hadoop3.2.1 webhdfs put文件失败 任务 2023/4/7 18:02 严重 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
4 I9G2PH 测试!!!软件市场精品应用curl-null镜像自动更新,8.4.0->8.4.1 任务 2024/4/12 11:45 无优先级 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I9G2PH
5 I8ON6X Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21] 任务 2023/12/15 11:06 无优先级 src-openEuler/dbus Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
6 I9FVI3 22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步 任务 2024/4/11 16:57 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
7 I9JNBG 虚拟机使用ext4文件系统,扩容磁盘后,执行resize2fs扩容文件系统出错 任务 2024/4/25 17:00 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9JNBG
8 I9MM3F 回合上游社区补丁,补丁数量:3 缺陷 2024/5/6 16:39 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3F
9 I9MM3H 回合上游社区补丁,补丁数量:2 缺陷 2024/5/6 16:39 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3H
10 I9MM3K 回合上游社区补丁,补丁数量:3 缺陷 2024/5/6 16:39 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3K
11 I9NFH0 /usr/lib/sysctl.d/10-default-yama-scope.conf文件标记情况 任务 2024/5/8 13:57 无优先级 src-openEuler/elfutils Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NFH0
12 I9OAJG [OLK 6.6]ethtool: add support for vxlan feature 任务 2024/5/10 20:37 无优先级 src-openEuler/ethtool Networking
https://gitee.com/open_euler/dashboard?issue_id=I9OAJG
13 I4V9K0 gcc 10.3.0 __libc_vfork符号丢失(i686架构) 任务 2022/2/25 14:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
14 I6UDV8 Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp 任务 2023/4/10 16:14 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
15 I70VML 指针压缩选项的错误提示内容有误。 缺陷 2023/5/6 16:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
16 I7CKVY peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错 缺陷 2023/6/11 22:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
17 I7CWOS Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level 任务 2023/6/12 20:51 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
18 I7EZAZ 无法在sw_64下编译nodejs 任务 2023/6/20 16:50 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
19 I8PL8Q Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17] 任务 2023/12/19 11:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
20 I9C507 gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化 缺陷 2024/3/27 18:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
21 I9DV2U spec文件不同架构分支存在相同构建方式 任务 2024/4/3 11:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
22 I9K3JP gcc 11.0.4 编译报错 cc1plus: internal compiler error: in fail_formatted, at selftest.c:63 任务 2024/4/27 12:12 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K3JP
23 I9BNUP 使用clang时缺少gnu/stubs-32.h文件 任务 2024/3/26 13:43 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
24 I9NACB 回合上游社区补丁,补丁数量:6 缺陷 2024/5/8 9:32 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9NACB
25 I7LSWG Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03] 任务 2023/7/17 20:50 无优先级 src-openEuler/gtk2 Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
26 I9O69Y 回合上游社区高版本补丁,补丁数量:1 缺陷 2024/5/10 15:15 无优先级 src-openEuler/iproute Networking
https://gitee.com/open_euler/dashboard?issue_id=I9O69Y
27 I4YT2R iscsi登录操作并发sysfs读操作概率导致空指针访问 任务 2022/3/21 15:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
28 I58CJR 删除iptable_filter.ko时出现空指针问题 任务 2022/5/19 20:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
29 I5C33B OLK-5.10 page owner功能增强 任务 2022/6/13 20:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
30 I5D9J8 Upgrade to latest release [kernel: 5.10.0 -> 5.17] 任务 2022/6/21 10:01 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
31 I5G321 【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic 任务 2022/7/8 9:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
32 I5H311 修复CVE-2022-2380 任务 2022/7/14 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
33 I5I2M8 x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware. 任务 2022/7/21 9:47 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
34 I5OOLB 反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397 任务 2022/8/29 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
35 I5PBRB 注入内存申请故障,i40iw_initialize_dev失败时出现oops复位 任务 2022/9/2 9:56 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
36 I5RH8C 内存可靠性分级需求 任务 2022/9/16 16:16 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
37 I5V92B openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划 任务 2022/10/12 11:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
38 I5VCIJ openEuler如何适配新硬件,请提供适配流程指导 任务 2022/10/12 17:14 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
39 I5WCP1 回合bpftool prog attach/detach命令 任务 2022/10/18 16:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
40 I6FZWY 主线回合scsi: iscsi_tcp: Fix UAF during logout and login 任务 2023/2/18 11:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
41 I6HXB9 kernel.spec中是否会新增打包intel-sst工具 任务 2023/2/27 10:06 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
42 I6N49D 【openeuler-22.03-LTS-SP】 任务 2023/3/14 20:12 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
43 I6VWNS 主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析 任务 2023/4/15 10:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
44 I8KAVR dnf reinstall kernel 导致grub.conf 本内核项被删除 任务 2023/11/29 10:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
45 I8UCFC 鲲鹏920服务器多次重启后系统盘盘符跳变 任务 2024/1/8 11:18 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
46 I8XTDI rpm宏用$引用可能会出现空值 缺陷 2024/1/21 22:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
47 I97V59 preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机 缺陷 2024/3/12 16:09 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
48 I9COZE 【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式 缺陷 2024/3/29 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
49 I9CQSL openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡 缺陷 2024/3/29 16:57 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
50 I9H2MR 【误解提示】救援模式下,提示用户输入root密码 缺陷 2024/4/16 14:39 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H2MR
51 I9J6XR 【OLK 5.10】主线补丁回合:mm/mmap: fix memory leak in mmap_region() 任务 2024/4/24 11:22 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6XR
52 I9J6ZB 【OLK 5.10】主线补丁回合:powerpc/32: Call mmu_mark_initmem_nx() regardless of data block mapping. 任务 2024/4/24 11:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZB
53 I9J6ZO 【OLK 5.10】主线补丁回合:x86/mm/tlb: Revert retpoline avoidance approach 任务 2024/4/24 11:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZO
54 I9KYID build error:nothing provides sign-openEuler 缺陷 2024/4/30 15:21 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9KYID
55 I9MYC8 【22.03-SP3】使用x86的RT版本,出现hardlockup 缺陷 2024/5/7 11:45 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9MYC8
56 I7B6KR kerberos安装缺少krb5-auth-dialog 和 krb5-workstation 任务 2023/6/6 9:51 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
57 I8OOF1 Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14] 任务 2023/12/15 12:29 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
58 I9MKV9 Do not reload a modified profile data object,回合上游社区补丁,补丁数量:1 任务 2024/5/6 16:00 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9MKV9
59 I8OOF5 Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11] 任务 2023/12/15 12:31 无优先级 src-openEuler/libarchive Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
60 I8VIRN Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31] 任务 2024/1/12 9:17 无优先级 src-openEuler/libcap sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
61 I9H736 Upgrade to latest release [libiscsi: 1.19.0 -> 1.20.0] 任务 2024/4/16 17:40 无优先级 src-openEuler/libiscsi Storage
https://gitee.com/open_euler/dashboard?issue_id=I9H736
62 I8VIRQ Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13] 任务 2024/1/12 9:17 无优先级 src-openEuler/libselinux sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
63 I9FU1M [openEuler-22.03-LTS] libvirt install failed 任务 2024/4/11 15:44 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
64 I96BZU 逻辑卷组修复 任务 2024/3/6 15:36 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
65 I9NW26 回合上游社区补丁,补丁数量:1 缺陷 2024/5/9 16:10 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I9NW26
66 I9O5FD [24.03-LTS]libvdpau_virtio_gpu.so 重复打包 任务 2024/5/10 14:31 无优先级 src-openEuler/mesa Desktop
https://gitee.com/open_euler/dashboard?issue_id=I9O5FD
67 I6MJB4 openssl 3.0 支持TLCP特性 任务 2023/3/13 11:35 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
68 I71KX8 python3.spec文件中,无效的ifarch语句 任务 2023/5/9 15:00 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
69 I9KDQU 【oe-24.03】执行场景复现脚本报错 任务 2024/4/28 16:10 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9KDQU
70 I6PA84 神威架构,虚拟化启动失败 任务 2023/3/22 17:20 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
71 I7A5FW Fixed CPU topology issues and add lbt support for kvm. 任务 2023/6/1 17:18 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
72 I7L968 Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09] 任务 2023/7/14 17:09 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
73 I8790J need EPYC-Genoa model support 任务 2023/10/11 16:53 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
74 I8SZWW qemu 4.1 虚拟机热迁移到qemu 6.2失败 任务 2024/1/2 17:01 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
75 I8ZJG1 欧拉系统virt-install 创建虚拟机video类型默认使用qxl 任务 2024/1/29 10:44 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
76 I95DT3 openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布? 任务 2024/3/4 0:39 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
77 I9GV9V qemu-8.2.0-6.oe2403.x86_64.src.rpm 在编译的check阶段执行tests/qtest/bios-tables-test是测试失败 缺陷 2024/4/15 20:30 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9GV9V
78 I9HBPH mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist 缺陷 2024/4/17 10:23 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9HBPH
79 I9KPI1 [openeuler 24.03] qemu8.2 无法创建uefi虚拟机 缺陷 2024/4/29 16:35 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9KPI1
80 I9NPRO x86服务器使用aarch64-openeuler-linux-gcc工具链交叉编译shadow软件包失败 缺陷 2024/5/9 10:24 无优先级 src-openEuler/shadow Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NPRO
81 I96B4W systemd中缺少文件 任务 2024/3/6 14:53 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
82 I9NZT3 systemctl运行service-log-level和service-log-target命令时,不能自动提示补全 任务 2024/5/9 21:03 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NZT3
83 I9NGLB 中文情况下,sfdisk /dev/sdb产生core文件 缺陷 2024/5/8 14:51 无优先级 src-openEuler/util-linux Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NGLB
openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
>
1
0
0
0
Compiler SIG 双周例会
by openEuler conference
10 May '24
10 May '24
您好! Compiler 邀请您参加 2024-05-14 10:00 召开的Zoom会议(自动录制) 会议主题:Compiler SIG 双周例会 会议内容: 1. 进展update 欢迎继续申报议题~ 会议链接:https://us06web.zoom.us/j/81141435780?pwd=OQQ2QaREC81RxtW3bZJfZVkQfeDGbn.1
会议纪要:https://etherpad.openeuler.org/p/Compiler-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! Compiler invites you to attend the Zoom conference(auto recording) will be held at 2024-05-14 10:00, The subject of the conference is Compiler SIG 双周例会, Summary: 1. 进展update 欢迎继续申报议题~ You can join the meeting at
https://us06web.zoom.us/j/81141435780?pwd=OQQ2QaREC81RxtW3bZJfZVkQfeDGbn.1
. Add topics at
https://etherpad.openeuler.org/p/Compiler-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
openeuler 24.03 LTS RC5版本构建通知
by yangchaohao
09 May '24
09 May '24
各位openeuler社区的maintainer、 committer和contributor们好: 社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于5月11号12点创建快照,开始构建RC5版本,此时间点之后合入PR默认不带入版本! ________________________________ 杨超豪 Yang Chaohao Email:yangchaohao(a)huawei.com<mailto:yangchaohao@huawei.com>
1
0
0
0
bigdata SIG例会
by openEuler conference
09 May '24
09 May '24
您好! bigdata 邀请您参加 2024-05-09 16:00 召开的Zoom会议(自动录制) 会议主题:bigdata SIG例会 会议链接:https://us06web.zoom.us/j/81493939462?pwd=id3wT91FLhnAUNGZy14vmmw75wI6WI.1
会议纪要:https://etherpad.openeuler.org/p/bigdata-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! bigdata invites you to attend the Zoom conference(auto recording) will be held at 2024-05-09 16:00, The subject of the conference is bigdata SIG例会, You can join the meeting at
https://us06web.zoom.us/j/81493939462?pwd=id3wT91FLhnAUNGZy14vmmw75wI6WI.1
. Add topics at
https://etherpad.openeuler.org/p/bigdata-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
openeuler 22.03 LTS SP4分支初始化公示通知
by yangchaohao
08 May '24
08 May '24
各位openeuler社区的maintainer、 committer和contributor们好:
openEuler-22.03-LTS-SP4分支初始化创建pr已提交,链接为https://gitee.com/openeuler/communit…
请涉及各sig的maintainer检视,如无问题请评论/lgtm 。 公示三天,若无反对意见,将于5月11日12点合入。 ________________________________ 杨超豪 Yang Chaohao Email:yangchaohao(a)huawei.com<mailto:yangchaohao@huawei.com>
1
0
0
0
openEuler安全委员会例会
by openEuler conference
08 May '24
08 May '24
您好! security-committee 邀请您参加 2024-05-15 16:00 召开的Zoom会议(自动录制) 会议主题:openEuler安全委员会例会 会议链接:https://us06web.zoom.us/j/89756452501?pwd=PBWSy0ZVQ9DxSZ2ZZcOqSCMRZXkhwQ.1
会议纪要:https://etherpad.openeuler.org/p/security-committee-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! security-committee invites you to attend the Zoom conference(auto recording) will be held at 2024-05-15 16:00, The subject of the conference is openEuler安全委员会例会, You can join the meeting at
https://us06web.zoom.us/j/89756452501?pwd=PBWSy0ZVQ9DxSZ2ZZcOqSCMRZXkhwQ.1
. Add topics at
https://etherpad.openeuler.org/p/security-committee-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
openEuler Kernel SIG双周例会
by openEuler conference
08 May '24
08 May '24
您好! Kernel 邀请您参加 2024-05-10 14:00 召开的WeLink会议(自动录制) 会议主题:openEuler Kernel SIG双周例会 会议内容: 1. 进展update 2. 议题征集中(新增议题可回复本邮件申报,或直接填写至会议纪要看板) 会议链接:https://meeting.huaweicloud.com:36443/#/j/987502806
会议纪要:https://etherpad.openeuler.org/p/Kernel-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! Kernel invites you to attend the WeLink conference(auto recording) will be held at 2024-05-10 14:00, The subject of the conference is openEuler Kernel SIG双周例会, Summary: 1. 进展update 2. 议题征集中(新增议题可回复本邮件申报,或直接填写至会议纪要看板) You can join the meeting at
https://meeting.huaweicloud.com:36443/#/j/987502806
. Add topics at
https://etherpad.openeuler.org/p/Kernel-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
eBPF SIG例会
by openEuler conference
08 May '24
08 May '24
您好! sig-ebpf 邀请您参加 2024-05-08 16:30 召开的Zoom会议(自动录制) 会议主题:eBPF SIG例会 会议链接:https://us06web.zoom.us/j/86446420786?pwd=lMbFb0CBaHyBJXUgiSAaItiMZdhQBU.1
会议纪要:https://etherpad.openeuler.org/p/sig-ebpf-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello! sig-ebpf invites you to attend the Zoom conference(auto recording) will be held at 2024-05-08 16:30, The subject of the conference is eBPF SIG例会, You can join the meeting at
https://us06web.zoom.us/j/86446420786?pwd=lMbFb0CBaHyBJXUgiSAaItiMZdhQBU.1
. Add topics at
https://etherpad.openeuler.org/p/sig-ebpf-meetings
. More information:
https://www.openeuler.org/en/
1
0
0
0
← Newer
1
...
26
27
28
29
30
31
32
...
337
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
Results per page:
10
25
50
100
200