Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230510发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230510发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230510发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230510发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/05/20)提供 update_ 20230517 版本。
openEuler-20.03-LTS-SP1 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KC?from=project-is...
CVE修复: CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2023-31436
kernel
7.8
CVE-2023-2483
kernel
1
CVE-2023-2269
kernel
5.5
CVE-2023-2194
kernel
6.7
CVE-2023-2177
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2007
kernel
4.4
CVE-2022-31629
php
6.5
CVE-2022-31628
php
5.5
Bugfix: issue
仓库
#I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281)
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-20.03-LTS-SP3 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞11个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KD?from=project-is...
CVE修复: 需求类型
软件包
优先级
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2023-2007
kernel
4.4
CVE-2023-2176
kernel
7.8
CVE-2023-2177
kernel
5.5
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
CVE-2022-31628
php
5.5
CVE-2022-31629
php
6.5
Bugfix: issue
仓库
#I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281)
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS Update 20230510
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞15个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KE?from=project-is...
CVE修复: CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-24607
qt5-qtbase
7.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2022-4382
kernel
7.4
CVE-2023-0458
kernel
5.3
CVE-2023-1998
kernel
5.6
CVE-2023-2007
kernel
4.4
CVE-2023-2008
kernel
7.8
CVE-2023-2166
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
CVE-2022-31629
php
6.5
Bugfix: issue
仓库
#I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope...
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope...
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS SP1 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KB?from=project-is...
CVE修复: CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2022-4382
kernel
7.4
CVE-2023-0458
kernel
5.3
CVE-2023-1998
kernel
5.6
CVE-2023-2007
kernel
4.4
CVE-2023-2166
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
Bugfix: issue
仓库
#I7059Z:ip_conflict_check中获取的网卡名为空
X-diagnosis
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
#I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope...
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope...
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I666GB
dnf group install Core之后dnf group remove Core '--disablerepo=*'会卸载被保护的软件包
dnf
sig-OS-Builder
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%B...
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-2019
I6VK2N
0.34
4.4
risc-v-kernel
sig-RISC-V
CVE-2022-4893
I6VR1V
0.95
0.0
freeipa
oVirt
CVE-2023-32007
I6ZW0C
3.02
8.8
spark
sig-bigdata
CVE-2023-31975
I71QSG
3.21
9.8
yasm
Base-service
CVE-2023-30861
I6ZWOG
3.39
7.5
python-flask
Programming-language
CVE-2023-30772
I6W80Q
3.76
6.4
risc-v-kernel
sig-RISC-V
CVE-2023-2002
I6WHKR
4.24
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-28856
I6WI59
4.63
6.5
python-redis
Base-service
CVE-2023-28856
I6WI58
4.63
6.5
redis6
sig-bigdata
CVE-2023-28856
I6WI57
4.63
6.5
redis5
sig-bigdata
CVE-2023-28856
I6WI55
4.63
6.5
redis
Others
CVE-2023-2162
I6WUDR
5.47
5.5
kernel
Kernel
CVE-2023-2166
I6WUDQ
5.47
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2162
I6WUDO
5.47
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-21962
I6WUEQ
5.49
4.9
mysql5
DB
CVE-2023-21917
I6WUEP
5.49
4.9
mysql5
DB
CVE-2023-21977
I6WUEN
5.49
4.9
mysql5
DB
CVE-2023-21940
I6WUEM
5.49
4.4
mysql5
DB
CVE-2023-21911
I6WUEK
5.49
4.9
mysql5
DB
CVE-2023-21953
I6WUEF
5.49
4.9
mysql5
DB
CVE-2023-21947
I6WUEE
5.49
4.4
mysql5
DB
CVE-2023-21920
I6WUEC
5.49
4.9
mysql5
DB
CVE-2023-21976
I6WUDV
5.49
4.9
mysql5
DB
CVE-2023-21919
I6WUET
5.5
4.9
mysql5
DB
CVE-2023-21972
I6WUES
5.5
4.9
mysql5
DB
CVE-2023-21945
I6WUFO
5.51
4.9
mysql5
DB
CVE-2023-21933
I6WUFM
5.51
4.9
mysql5
DB
CVE-2023-21935
I6WUFL
5.51
4.9
mysql5
DB
CVE-2023-21982
I6WUFJ
5.51
4.9
mysql5
DB
CVE-2023-21955
I6WUFI
5.51
4.9
mysql5
DB
CVE-2023-21929
I6WUFH
5.51
5.5
mysql5
DB
CVE-2023-21966
I6WUFG
5.51
4.9
mysql5
DB
CVE-2023-21963
I6WUFE
5.51
2.7
mysql5
DB
CVE-2023-21913
I6WUFA
5.51
4.9
mysql5
DB
CVE-2022-45048
I70CLU
5.58
8.8
apache-ranger
CVE-2023-21946
I6WUHV
5.63
6.5
mysql5
DB
CVE-2023-31039
I72MNP
5.93
9.8
brpc
dev-utils
CVE-2023-2177
I6X47F
6.06
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2177
I6X47E
6.06
5.5
kernel
Kernel
CVE-2023-26048
I6X44B
6.06
5.3
jetty
sig-Java
CVE-2023-2124
I6X4UQ
6.13
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-37434
I72RG3
6.18
9.8
mysql
Others
CVE-2023-21968
I6X5PF
6.24
3.7
openjdk-latest
Compiler
CVE-2023-21968
I6X5PD
6.24
3.7
openjdk-11
Compiler
CVE-2023-21939
I6X5N4
6.24
5.3
openjdk-1.8.0
Compiler
CVE-2023-21939
I6X5N2
6.24
5.3
openjdk-latest
Compiler
CVE-2023-21939
I6X5N1
6.24
5.3
openjdk-11
Compiler
CVE-2023-21938
I6X5R0
6.25
3.7
openjdk-11
Compiler
CVE-2023-21938
I6X5QV
6.25
3.7
openjdk-1.8.0
Compiler
CVE-2023-21938
I6X5QU
6.25
3.7
openjdk-latest
Compiler
CVE-2023-21968
I6X5Q5
6.25
3.7
openjdk-1.8.0
Compiler
CVE-2023-21967
I6X5T1
6.26
5.9
openjdk-latest
Compiler
CVE-2023-21967
I6X5SQ
6.26
5.9
openjdk-11
Compiler
CVE-2023-21967
I6X5SN
6.26
5.9
openjdk-1.8.0
Compiler
CVE-2023-21954
I6X5SL
6.26
5.9
openjdk-11
Compiler
CVE-2023-21954
I6X5SI
6.26
5.9
openjdk-1.8.0
Compiler
CVE-2023-21954
I6X5SH
6.26
5.9
openjdk-latest
Compiler
CVE-2023-21937
I6X5RP
6.26
3.7
openjdk-1.8.0
Compiler
CVE-2023-21937
I6X5RO
6.26
3.7
openjdk-latest
Compiler
CVE-2023-21937
I6X5RL
6.26
3.7
openjdk-11
Compiler
CVE-2023-25759
I6X66O
6.37
5.4
platform
sig-epol
CVE-2023-30549
I70QQV
6.76
7.8
apptainer
CVE-2022-2084
I6XCBL
6.93
5.5
cloud-init
Base-service
CVE-2023-1729
I6XGSW
7.15
0.0
LibRaw
Programming-language
CVE-2023-2194
I6XHPM
7.32
6.7
risc-v-kernel
sig-RISC-V
CVE-2023-1255
I6XHT7
7.36
5.9
openssl
sig-security-facility
CVE-2023-2222
I6XRGM
8.06
0.0
binutils
Compiler
CVE-2023-31484
I6ZROS
9.67
8.1
perl
Base-service
CVE-2023-26049
I6XY2G
9.71
5.3
jetty
sig-Java
CVE-2023-31972
I71QSB
10.21
7.8
yasm
Base-service
CVE-2023-31974
I71QS7
10.21
7.8
yasm
Base-service
CVE-2023-31973
I71R05
10.23
7.8
yasm
Base-service
CVE-2023-2610
I71RGF
10.58
7.8
vim
Base-service
CVE-2023-31085
I6YKYI
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31081
I6YKXQ
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31082
I6YKXJ
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31084
I6YKXB
11.69
5.5
kernel
Kernel
CVE-2023-31081
I6YKX6
11.69
5.5
kernel
Kernel
CVE-2023-31082
I6YKX3
11.69
5.5
kernel
Kernel
CVE-2023-31083
I6YOAV
11.82
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-31083
I6YOAU
11.82
4.7
kernel
Kernel
CVE-2023-31085
I6YOAJ
11.82
5.5
kernel
Kernel
CVE-2023-31084
I6YO9Y
11.82
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2269
I6YR06
11.94
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-30402
I6YWGP
12.43
5.5
yasm
Base-service
CVE-2023-26735
I6Z1YC
12.93
6.3
blackbox_exporter
sig-CloudNative
CVE-2023-0215
I72RGR
13.18
7.5
mysql
Others
CVE-2023-0458
I6Z6SU
13.59
5.3
kernel
Kernel
CVE-2023-1786
I6Z6T2
13.61
5.5
cloud-init
Base-service
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%8...
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%8...
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d651...
社区QA 测试平台 radiates
https://radiatest.openeuler.orghttps://radiatest.openeuler.org/
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1@huawei.commailto:muyuying1@huawei.com
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it