mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
List overview
Download
Qa
April 2023
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
qa@openeuler.org
7 participants
12 discussions
Start a n
N
ew thread
qa sig双周例会
by openEuler conference
10 Apr '23
10 Apr '23
您好! sig-QA SIG 邀请您参加 2023-04-12 14:15 召开的Zoom会议(自动录制) 会议主题:qa sig双周例会 会议链接:https://us06web.zoom.us/j/88222953909?pwd=SzdWVVhldm9maTlCWC9jbUE5cHFmUT09
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-QA SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-04-12 14:15, The subject of the conference is qa sig双周例会, You can join the meeting at
https://us06web.zoom.us/j/88222953909?pwd=SzdWVVhldm9maTlCWC9jbUE5cHFmUT09
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler update_20230329版本发布公告
by muyuying
01 Apr '23
01 Apr '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230329发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230329发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供 update_ 20230405 版本。 openEuler-20.03-LTS-SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41725 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41723 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27538 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27535 curl 5.8 CVE-2023-27534 curl 4.5 CVE-2023-27533 curl 4.5 CVE-2023-26769 liblouis 7.5 CVE-2022-36021 redis 5.5 CVE-2023-28466 kernel 7 CVE-2023-1382 kernel 0 CVE-2023-1281 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2022-4269 kernel 5.5 CVE-2022-29901 kernel 5.6 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-29901 kernel 5.6 CVE-2022-4269 kernel 5.5 CVE-2023-1079 kernel 6.8 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6KMOJ:grub2支持tpcm3.0特性 grub2 #I6L25L:shim支持可信计算3.0tpcm特性 shim #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-48423 kernel 7.8 CVE-2022-48424 kernel 7.8 CVE-2022-48425 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2023-1249 kernel 4.1 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-22999 kernel 5.5 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6MTKW:【grub2】grub2-rpm-sort命令执行报错 grub2 #I6RDEF:update20230329 添加sw架构 perftest #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6RE2O:update20230329 [Update] Update to v0.4.1 pin-gcc-client #I64VTB:执行命令报错error -4 papi #I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2 procps-ng #I6GCRA:部署好server,client,插入ko,虚拟机重启 dpu-utilities #I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率 st,st占用率一直显示为0 procps-ng #I6RE77:update20230329 update syscare to 1.0.1 syscare #I67PXN:fix changelog date error rsyslog #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-25664 I6Q9HZ 0.17 9.8 tensorflow sig-ai CVE-2023-27586 I6OW3B 3.0 7.1 python-cairosvg CVE-2023-0386 I6PBWH 4.17 7.8 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1194 I6KDP0 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWP 4.38 0.0 risc-v-kernel sig-RISC-V CVE-2023-0464 I6PDB8 4.42 7.5 openssl sig-security-facility CVE-2023-1249 I6KT9F 5.26 5.5 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 5.26 5.5 kernel Kernel CVE-2023-28772 I6PRCO 5.75 7.8 kernel Kernel CVE-2023-1108 I6KVMO 5.76 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 5.8 6.5 libmemcached Programming-language CVE-2023-25669 I6Q38F 6.67 7.5 tensorflow sig-ai CVE-2023-25670 I6Q38E 6.67 7.5 tensorflow sig-ai CVE-2023-25659 I6Q37O 6.67 7.5 tensorflow sig-ai CVE-2023-25658 I6Q37N 6.67 7.5 tensorflow sig-ai CVE-2023-25673 I6Q9HC 7.16 7.5 tensorflow sig-ai CVE-2023-25671 I6Q9HA 7.16 7.5 tensorflow sig-ai CVE-2023-25665 I6Q9H7 7.16 7.5 tensorflow sig-ai CVE-2023-27579 I6Q9G1 7.16 7.5 tensorflow sig-ai CVE-2023-25663 I6Q9IB 7.17 7.5 tensorflow sig-ai CVE-2023-25666 I6Q9I8 7.17 7.5 tensorflow sig-ai CVE-2023-25667 I6Q9I6 7.17 7.5 tensorflow sig-ai CVE-2023-25660 I6Q9I4 7.17 7.5 tensorflow sig-ai CVE-2023-25674 I6Q9HW 7.17 7.5 tensorflow sig-ai CVE-2023-25662 I6Q9HP 7.17 7.5 tensorflow sig-ai CVE-2023-25672 I6Q9HK 7.17 7.5 tensorflow sig-ai CVE-2023-1289 I6LKHN 7.38 5.5 ImageMagick Others CVE-2011-5034 I6LPRE 7.96 0.0 geronimo-saaj sig-Java CVE-2023-1436 I6P70O 11.35 7.5 jettison dev-utils CVE-2023-1370 I6MX6A 11.35 7.5 json-smart sig-Java CVE-2023-1032 I6MSIY 11.63 0.0 kernel Kernel CVE-2023-28176 I6N797 12.77 0.0 firefox Application CVE-2023-28159 I6N78R 12.77 0.0 firefox Application CVE-2023-1390 I6N7CV 12.78 6.5 risc-v-kernel sig-RISC-V CVE-2023-28164 I6N87J 12.8 6.1 firefox Application CVE-2023-28162 I6N860 12.8 0.0 firefox Application CVE-2023-28177 I6N8JV 12.81 0.0 firefox Application CVE-2023-28163 I6N8EY 12.81 0.0 firefox Application CVE-2023-28161 I6N8CG 12.81 0.0 firefox Application CVE-2023-28160 I6N89T 12.81 0.0 firefox Application CVE-2023-25752 I6N96P 12.83 6.1 firefox Application CVE-2023-25750 I6N96C 12.83 0.0 firefox Application CVE-2023-25748 I6N965 12.83 0.0 firefox Application CVE-2023-25749 I6N960 12.83 0.0 firefox Application CVE-2023-25751 I6N97Z 12.84 0.0 firefox Application CVE-2023-28328 I6NCQH 13.0 0.0 kernel Kernel CVE-2023-28327 I6NCP2 13.0 0.0 kernel Kernel CVE-2023-1380 I6NCVX 13.01 0.0 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
← Newer
1
2
Older →
Jump to page:
1
2
Results per page:
10
25
50
100
200