mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
List overview
Download
Qa
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
qa@openeuler.org
3 participants
539 discussions
Start a n
N
ew thread
2022/11/16 QA例会 议题申请
by 9090-90-90-9090
16 Nov '22
16 Nov '22
2022/11/16 QA例会 议题申请 社区特性测试策略模板评审 - 张子杨
1
0
0
0
2022/11/16 QA例会 议题申请
by 9090-90-90-9090
15 Nov '22
15 Nov '22
2022/11/16 QA例会 议题申请 社区特性测试策略模板评审 - 张子杨
1
0
0
0
qa-sig双周例会
by openEuler conference
15 Nov '22
15 Nov '22
您好! sig-QA SIG 邀请您参加 2022-11-16 14:15 召开的Zoom会议(自动录制) 会议主题:qa-sig双周例会 会议链接:https://us06web.zoom.us/j/82007338974?pwd=YTFIWDFkcG53dm9rS2JkNkRzWnlNUT09
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-QA SIG invites you to attend the Zoom conference(auto recording) will be held at 2022-11-16 14:15, The subject of the conference is qa-sig双周例会, You can join the meeting at
https://us06web.zoom.us/j/82007338974?pwd=YTFIWDFkcG53dm9rS2JkNkRzWnlNUT09
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler update_20221107版本发布公告
by chemingdao
14 Nov '22
14 Nov '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221107发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221107发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221107发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/11/18)提供 update_20221114版本。 openEuler-20.03-LTS-SP1 Update 20221107 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题6个,已知漏洞13个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPR5?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-44638 pixman 8.8 CVE-2022-43995 sudo 7.1 CVE-2022-40304 libxml2 8.1 CVE-2022-40303 libxml2 7.5 CVE-2022-2602 kernel 6.5 CVE-2021-30560 libxslt 8.8 CVE-2022-34917 kafka 7.5 CVE-2022-26612 hadoop 9.8 CVE-2022-25168 hadoop 9.8 CVE-2021-37404 hadoop 9.8 CVE-2019-12399 kafka 7.5 CVE-2022-3756 exiv2 8.8 CVE-2022-40284 nfs-3g 7.8 Bugfix: issue 仓库 #I5Z86E:【OLK-5.10】KASAN: use-after-free Read in eth_type_trans kernel #I6038I:修复问题和优化代码 oec-hardware #I4G5U2:AddressSanitizer CHECK failed in sdscatvprintf hiredis #I604IM:【openEuler-20.03-LTS-SP1】performance.sh脚本中代码对性能有影响 openEuler-release #I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖 nodejs-grunt #I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败 nodejs-minimatch openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221107 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题6个,已知漏洞18个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPR8?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-44638 pixman 8.8 CVE-2022-43995 sudo 7.1 CVE-2022-42012 dbus 6.5 CVE-2022-42011 dbus 6.5 CVE-2022-42010 dbus 6.5 CVE-2022-40304 libxml2 8.1 CVE-2022-40303 libxml2 7.5 CVE-2022-2602 kernel 6.5 CVE-2021-30560 libxslt 8.8 CVE-2021-28041 openssh 7.1 CVE-2021-38593 qt5-qtbase 7.5 CVE-2022-34917 kafka 7.5 CVE-2022-26612 hadoop 9.8 CVE-2022-25168 hadoop 9.8 CVE-2021-37404 hadoop 9.8 CVE-2019-12399 kafka 7.5 CVE-2022-3756 exiv2 8.8 CVE-2022-40284 nfs-3g 7.8 Bugfix: issue 仓库 #I5Z86E:【OLK-5.10】KASAN: use-after-free Read in eth_type_trans kernel #I5YZLF:openEuler-20.03-lts-SP3需要同步mster代码 grep #I6038I:修复问题和优化代码 oec-hardware #I604J1:【openEuler-20.03-LTS-SP3】performance.sh脚本中代码对性能有影响 openEuler-release #I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖 nodejs-grunt #I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败 nodejs-minimatch openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221107 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题9个,已知漏洞76个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPRA?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2021-45444 zsh 8.8 CVE-2022-24130 xterm 5.5 CVE-2022-23645 swtpm 5.5 CVE-2022-43995 sudo 7.1 CVE-2022-24303 python-pillow 5.9 CVE-2022-44638 pixman 8.8 CVE-2021-30560 libxslt 8.8 CVE-2022-23308 libxml2 7.5 CVE-2022-40303 libxml2 7.5 CVE-2022-40304 libxml2 8.1 CVE-2022-0561 libtiff 5.5 CVE-2022-0562 libtiff 5.5 CVE-2022-0891 libtiff 7.1 CVE-2022-22844 libtiff 5.5 CVE-2022-3542 kernel 5.5 CVE-2022-3606 kernel 5.5 CVE-2022-40768 kernel 5.5 CVE-2022-25235 expat 7.8 CVE-2022-25236 expat 9.8 CVE-2022-25313 expat 6.5 CVE-2022-25314 expat 7.5 CVE-2022-25315 expat 6.5 CVE-2021-0129 bluez 5.7 CVE-2021-43400 bluez 9.1 CVE-2021-43859 xstream 7.5 CVE-2019-17570 xmlrpc 9.8 CVE-2022-0581 wireshark 7.5 CVE-2022-0582 wireshark 9.8 CVE-2022-0583 wireshark 7.5 CVE-2022-0585 wireshark 6.5 CVE-2022-0586 wireshark 7.5 CVE-2022-3725 wireshark 7.5 CVE-2019-25058 usbguard 7.8 CVE-2022-23181 tomcat 7 CVE-2020-35518 three-eight-nine-ds-base 5.3 CVE-2021-45079 strongswan 9.1 CVE-2020-7663 rubygem-websocket-extensions 7.5 CVE-2021-38593 qt5-qtbase 7.5 CVE-2021-45115 python-django 7.5 CVE-2021-45116 python-django 7.5 CVE-2021-45452 python-django 5.3 CVE-2022-22818 python-django 6.1 CVE-2022-23833 python-django 7.5 CVE-2020-8178 nodejs-jison 9.8 CVE-2020-7729 nodejs-grunt 7.1 CVE-2020-28282 nodejs-getobject 9.8 CVE-2019-13173 nodejs-fstream 7.5 CVE-2019-2692 mysql-connector-java 6.3 CVE-2021-34432 mosquitto 7.5 CVE-2021-4104 log4j12 7.5 CVE-2022-23302 log4j12 8.8 CVE-2022-23307 log4j12 9.8 CVE-2021-3596 ImageMagick 6.5 CVE-2021-39212 ImageMagick 4.4 CVE-2022-0711 haproxy 7.5 CVE-2022-21702 grafana 5.4 CVE-2018-17942 gnulib 8.8 CVE-2019-20378 ganglia 6.1 CVE-2019-20379 ganglia 6.1 CVE-2019-13508 freetds 9.8 CVE-2022-25235 firefox 9.8 CVE-2022-25236 firefox 9.8 CVE-2022-25315 firefox 9.8 CVE-2010-3996 festival 7.8 CVE-2021-23214 postgresql 8.1 CVE-2021-23222 postgresql 5.9 CVE-2020-29260 libvncserver 7.5 CVE-2019-12399 kafka 7.5 CVE-2022-34917 kafka 7.5 CVE-2021-37404 hadoop 9.8 CVE-2022-25168 hadoop 9.8 CVE-2022-26612 hadoop 9.8 CVE-2019-19308 gnome-font-viewer 5.5 CVE-2022-42919 python3 7.8 CVE-2022-3756 exiv2 8.8 CVE-2022-40284 nfs-3g 7.8 Bugfix: issue 仓库 #I5WGEF:auxtrace_Record_Reconstruct events in __init, HiSilicon PCIe tuning and tracing devices, PCIe trace packet support. kernel #I604JE:【openEuler-22.03-LTS】performance.sh脚本中代码对性能有影响 openEuler-release #I5YSWV:建议添加编译依赖make,方便rpmbuild本地编译 libnetfilter_cttimeout #I5YTIA:建议添加编译依赖make,方便rpmbuild本地编译 libnfnetlink #I5YSRO:fix Potential Null Pointer Dereference libdnet #I6038I:修复问题和优化代码 oec-hardware #I5ZZAH:rubygem-sqlite3在22.03-LTS分支编译失败 rubygem-sqlite3 #I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖 nodejs-grunt #I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败 nodejs-minimatch openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5Q4S3 [22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 kernel Kernel I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 SIG CVE-2022-2741 I5YPB2 1.1 7.5 zephyr sig-Zephyr CVE-2022-45062 I60DGK 2.78 9.8 xfce4-settings xfce CVE-2022-3535 I5W7BQ 2.94 3.5 risc-v-kernel sig-RISC-V CVE-2022-3531 I5W7BL 2.94 5.7 risc-v-kernel sig-RISC-V CVE-2022-3532 I5W7BF 2.94 5.7 risc-v-kernel sig-RISC-V CVE-2022-3533 I5W7AV 2.94 5.7 risc-v-kernel sig-RISC-V CVE-2022-3544 I5W7BX 2.95 5.5 risc-v-kernel sig-RISC-V CVE-2022-3543 I5W7BW 2.95 5.5 risc-v-kernel sig-RISC-V CVE-2022-3542 I5W7BT 2.95 5.5 risc-v-kernel sig-RISC-V CVE-2022-3563 I5W7ZQ 3.38 5.7 risc-v-kernel sig-RISC-V CVE-2022-38791 I5WD41 3.69 5.5 mariadb DB CVE-2016-5690 I60L14 3.85 9.8 ImageMagick Others CVE-2022-3586 I5WF1J 3.85 5.5 risc-v-kernel sig-RISC-V CVE-2022-3595 I5WFKO 4.26 5.5 risc-v-kernel sig-RISC-V CVE-2022-21589 I5WFL3 4.29 4.3 mysql5 DB CVE-2022-21608 I5WFL5 4.3 4.9 mysql5 DB CVE-2022-21592 I5WFL9 4.31 4.3 mysql5 DB CVE-2022-21617 I5WFLE 4.32 4.9 mysql5 DB CVE-2022-34169 I5HV9H 4.37 7.5 openjdk-1.8.0 Compiler CVE-2018-20657 I5WL3H 4.68 binutils Compiler CVE-2022-3606 I5WLYF 4.73 5.5 risc-v-kernel sig-RISC-V CVE-2022-21626 I5WMU2 4.79 5.3 openjdk-latest Compiler CVE-2022-21626 I5WMTY 4.79 5.3 openjdk-11 Compiler CVE-2022-21597 I5WMXW 4.8 5.3 openjdk-11 Compiler CVE-2022-21618 I5WMXA 4.8 5.3 openjdk-latest Compiler CVE-2022-21618 I5WMX4 4.8 5.3 openjdk-11 Compiler CVE-2022-21624 I5WMVR 4.8 3.7 openjdk-latest Compiler CVE-2022-21619 I5WMVP 4.8 3.7 openjdk-latest Compiler CVE-2022-21624 I5WMVM 4.8 3.7 openjdk-11 Compiler CVE-2017-11552 I5WMZS 4.81 6.5 libmad Others CVE-2022-39399 I5WMYV 4.81 3.7 openjdk-11 Compiler CVE-2022-39399 I5WMYG 4.81 3.7 openjdk-latest Compiler CVE-2022-21628 I5WMYC 4.81 5.3 openjdk-latest Compiler CVE-2022-21628 I5WMY2 4.81 5.3 openjdk-11 Compiler CVE-2018-17828 I5WN2X 4.82 5.5 zziplib Base-service CVE-2018-16548 I5WN1L 4.82 6.5 zziplib Base-service CVE-2022-21619 I5WN4Q 4.83 3.7 openjdk-11 Compiler CVE-2022-43945 I5ZL2W 5.28 7.5 kernel Kernel CVE-2022-42928 I5WR2P 5.61 firefox Application CVE-2022-3629 I5WYLP 6.6 3.3 risc-v-kernel sig-RISC-V CVE-2022-3624 I5WYKS 6.6 3.3 risc-v-kernel sig-RISC-V CVE-2022-3630 I5WYKI 6.6 5.5 risc-v-kernel sig-RISC-V CVE-2022-3619 I5X0EY 6.69 4.3 risc-v-kernel sig-RISC-V CVE-2022-42432 I5X2IL 6.93 risc-v-kernel sig-RISC-V CVE-2022-3344 I5X2N5 7.04 5.5 risc-v-kernel sig-RISC-V CVE-2022-3633 I5X3LH 7.56 3.3 risc-v-kernel sig-RISC-V CVE-2022-3872 I5ZWYZ 7.78 8.6 qemu Virt CVE-2022-3238 I5X87A 9.29 risc-v-kernel sig-RISC-V CVE-2021-39800 I5XCU6 9.62 5.5 kernel Kernel CVE-2022-39328 I60B4D 9.66 8.1 grafana Application CVE-2022-45061 I60CRW 9.73 7.5 python3 Base-service CVE-2022-45059 I60DGG 9.78 7.5 varnish System-tool CVE-2022-45060 I60DGE 9.78 7.5 varnish System-tool CVE-2022-3650 I5XNUK 10.78 ceph sig-ceph CVE-2022-3474 I5XXF6 12.22 4.3 bazel sig-bigdata CVE-2022-3707 I5XXFH 12.28 risc-v-kernel sig-RISC-V CVE-2022-3707 I5XXFF 12.28 kernel Kernel CVE-2022-39348 I5Y48K 12.79 5.4 python-twisted sig-python-modules CVE-2022-3718 I5Y4G1 12.81 6.5 exiv2 Desktop CVE-2022-24588 I5Y6LH 13.43 5.4 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image003.png@01D8F7BA.A401F8C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler update_20221031版本发布公告
by chemingdao
05 Nov '22
05 Nov '22
发件人: chemingdao 发送时间: 2022年10月29日 17:53 收件人: 'dev(a)openeuler.org' <dev(a)openeuler.org>; 'release(a)openeuler.org' <release(a)openeuler.org>; 'qa(a)openeuler.org' <qa(a)openeuler.org>; 'sa-announce(a)openeuler.org' <sa-announce(a)openeuler.org> 主题: openEuler update_20221031版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221031发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221031发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221031发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/11/11)提供 update_20221107版本。 openEuler-20.03-LTS-SP1 Update 20221031 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题6个,已知漏洞13个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLE?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-43680 expat 7.5 CVE-2022-32221 curl 4.8 CVE-2022-3437 samba 5.9 CVE-2022-3621 kernel 7.5 CVE-2022-3629 kernel 3.3 CVE-2022-3635 kernel 7 CVE-2022-3646 kernel 5.3 CVE-2022-40768 kernel 5.5 CVE-2022-43750 kernel 7.8 CVE-2022-3586 kernel 5.5 CVE-2022-41973 multipath-tools 7.8 CVE-2022-40617 strongswan 6.5 CVE-2022-3705 vim 7.5 Bugfix: issue 仓库 #I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 libiscsi #I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题 libiscsi #I5NV0Q:注意spec中changelog撰写规范 libiscsi #I5OX30:注意spec中changelog撰写规范 libiscsi #I5X9IO:fix xmtr cannot start in xface4 environment mtr #I5VVP6:【openEuler-1.0-LTS】uacce增加reference counter保护 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221031 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题12个,已知漏洞13个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLF?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-43680 expat 7.5 CVE-2022-32221 curl 4.8 CVE-2022-3437 samba 5.9 CVE-2022-3621 kernel 7.5 CVE-2022-3629 kernel 3.3 CVE-2022-3635 kernel 7 CVE-2022-3646 kernel 5.3 CVE-2022-40768 kernel 5.5 CVE-2022-43750 kernel 7.8 CVE-2022-3586 kernel 5.5 CVE-2022-41973 multipath-tools 7.8 CVE-2022-40617 strongswan 6.5 CVE-2022-3705 vim 7.5 Bugfix: issue 仓库 #I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 libiscsi #I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题 libiscsi #I5NV0Q:注意spec中changelog撰写规范 libiscsi #I5OX30:注意spec中changelog撰写规范 libiscsi #I5Z569:【20.03-sp3_update20221102】在dpvs场景适配内存页读写的控制 TCP_option_address #I5W3SJ:isulad gc流程加固 iSulad #I5RHBG:【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错 iSulad #I5Z59H:【20.03-sp3_update20221102】add required package lxc lower and upper version lcr #I5Z58W:【20.03-sp3_update20221102】 add required package lcr lower and upper version clibcni #I5Z59O:【20.03-sp3_update20221102】update version to 4.0.3-2022101701 lxc #I5YHK4:【CRI】kubectl exec由于数据丢失导致失败 kubernetes #I5VVP6:【openEuler-1.0-LTS】uacce增加reference counter保护 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221031 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞34个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLG?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-40617 strongswan 6.5 CVE-2022-43680 expat 7.5 CVE-2022-41973 multipath-tools 7.8 CVE-2022-3705 vim 7.5 CVE-2022-42915 curl 7.3 CVE-2022-32221 curl 4.8 CVE-2022-42916 curl 5.3 CVE-2022-3437 samba 5.9 CVE-2021-37616 exiv2 5.5 CVE-2021-37615 exiv2 5.5 CVE-2021-32815 exiv2 5.5 CVE-2021-37623 exiv2 5.5 CVE-2021-37622 exiv2 5.5 CVE-2021-34334 exiv2 5.5 CVE-2021-37620 exiv2 5.5 CVE-2021-37621 exiv2 5.5 CVE-2021-37619 exiv2 5.5 CVE-2021-34335 exiv2 5.5 CVE-2021-37618 exiv2 5.5 CVE-2021-31292 exiv2 7.5 CVE-2019-13108 exiv2 6.5 CVE-2019-13504 exiv2 6.5 CVE-2022-2978 kernel 7.8 CVE-2022-3523 kernel 5.3 CVE-2022-3535 kernel 3.5 CVE-2022-3625 kernel 7.8 CVE-2022-3629 kernel 3.3 CVE-2022-3621 kernel 7.5 CVE-2022-3623 kernel 7.5 CVE-2022-42432 kernel 1 CVE-2022-3646 kernel 5.3 CVE-2022-3635 kernel 7 CVE-2022-43750 kernel 7.8 CVE-2022-3628 kernel 1 Bugfix: issue 仓库 #I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 libiscsi #I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题 libiscsi #I5NV0Q:注意spec中changelog撰写规范 libiscsi #I5OX30:注意spec中changelog撰写规范 libiscsi #I5JNRY:remove dependency of nss-help for nss and nss-util nss #I5S7HX:增加spec文件中Provides和Obsoletes字段的版本号信息 sssd #I5R5G9:在spec文件中,为SMx算法添加provides字段 openssl #I5SCWP:需要提供libgcrypt-sm3 libgcrypt #I5OBVF:例行分析anaconda、grub2、libdnf软件包补丁 libdnf #I5TQV5: 开源软件包openssh社区补丁回合 openssh #I5YQKC: 并发执行isula-build时kill daemon,/var/lib/isula-build/storage/overlay目录存在残留 isula-build #I5OMXK:openEuler 22.03 LTS update版本发布yocto-pseudo yocto-pseudo #I5Z5BQ:fix no /dev/isgx on non-FLC platforms with 5.10 kernel linux-sgx-driver #I5Y13K:bunzip2 -L/-V和bzcat -L/-V查询信息打印异常且返回值不为0 bzip2 #I5RZPQ:bzip2提供的so版本不唯一 bzip2 #I5YRAC:【OLK-5.10】scsi: sd: Revert "scsi: sd: Remove a local variable" kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5Q4S3 [22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 kernel Kernel I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 SIG CVE-2022-3424 I5UBUG 1 risc-v-kernel sig-RISC-V CVE-2022-3577 I5X9E0 1.46 7.8 risc-v-kernel sig-RISC-V CVE-2022-3435 I5UJIG 1.99 4.3 risc-v-kernel sig-RISC-V CVE-2022-42703 I5USP2 3.5 5.5 risc-v-kernel sig-RISC-V CVE-2022-43750 I5XTUC 3.7 7.8 risc-v-kernel sig-RISC-V CVE-2022-3654 I5XWK1 3.85 8.8 chromium Application CVE-2022-3652 I5XWJV 3.85 8.8 chromium Application CVE-2022-3656 I5XWJT 3.85 8.8 chromium Application CVE-2022-3658 I5XWJR 3.85 8.8 chromium Application CVE-2022-3657 I5XWQK 3.88 8.8 chromium Application CVE-2022-3655 I5XWQJ 3.88 8.8 chromium Application CVE-2022-3659 I5XWY2 3.92 8.8 chromium Application CVE-2022-3653 I5XWXZ 3.92 8.8 chromium Application CVE-2022-3697 I5XXE0 4.08 7.5 ansible dev-utils CVE-2022-34169 I5HV9H 4.37 7.5 openjdk-1.8.0 Compiler CVE-2022-39286 I5Y50E 4.97 8.8 python-jupyter-core CVE-2022-3725 I5Y58X 5.08 7.5 wireshark Application CVE-2022-3466 I5VEVL 5.99 cri-o sig-CloudNative CVE-2022-3723 I5YENW 6.88 8.8 chromium Application CVE-2022-42721 I5VM7S 6.88 5.5 risc-v-kernel sig-RISC-V CVE-2022-42722 I5VMMV 6.99 5.5 risc-v-kernel sig-RISC-V CVE-2022-3757 I5YF3B 7.14 8.8 exiv2 Desktop CVE-2022-3756 I5YF3M 7.17 8.8 exiv2 Desktop CVE-2022-2741 I5YPB2 9.15 7.5 zephyr CVE-2022-42252 I5YPBQ 9.2 7.5 tomcat Application CVE-2022-41974 I5XJYL 9.41 7.8 multipath-tools Storage CVE-2022-3523 I5VZ0L 10.37 5.3 kernel Kernel CVE-2021-32785 I5Z074 10.52 7.5 httpd Networking CVE-2022-40304 I5W79V 10.98 libxml2 Base-service CVE-2022-40303 I5W79R 10.98 libxml2 Base-service CVE-2022-3544 I5W7BX 10.99 5.5 risc-v-kernel sig-RISC-V CVE-2022-3543 I5W7BW 10.99 5.5 risc-v-kernel sig-RISC-V CVE-2022-3542 I5W7BT 10.99 5.5 risc-v-kernel sig-RISC-V CVE-2022-3535 I5W7BQ 10.99 3.5 risc-v-kernel sig-RISC-V CVE-2022-3531 I5W7BL 10.99 5.7 risc-v-kernel sig-RISC-V CVE-2022-3532 I5W7BF 10.99 5.7 risc-v-kernel sig-RISC-V CVE-2022-3542 I5W7B1 10.99 5.5 kernel Kernel CVE-2022-3533 I5W7AV 10.99 5.7 risc-v-kernel sig-RISC-V CVE-2022-3563 I5W7ZQ 11.43 5.7 risc-v-kernel sig-RISC-V CVE-2022-3563 I5W7YB 11.43 5.7 kernel Kernel CVE-2022-43995 I5Z7XW 11.51 7.1 sudo Base-service CVE-2022-38791 I5WD41 11.73 5.5 mariadb DB CVE-2022-44638 I5ZCPG 11.86 8.8 pixman Desktop CVE-2022-3586 I5WF1J 11.9 5.5 risc-v-kernel sig-RISC-V CVE-2022-2602 I5WFKI 12.3 6.5 kernel Kernel CVE-2022-3595 I5WFKO 12.31 5.5 risc-v-kernel sig-RISC-V CVE-2022-3595 I5WFKN 12.31 5.5 kernel Kernel CVE-2022-21589 I5WFL3 12.34 4.3 mysql5 DB CVE-2022-21608 I5WFL5 12.35 4.9 mysql5 DB CVE-2022-21592 I5WFL9 12.36 4.3 mysql5 DB CVE-2022-21617 I5WFLE 12.37 4.9 mysql5 DB CVE-2022-32287 I5ZEF8 12.45 7.5 lucene4 sig-Java CVE-2018-20657 I5WL3H 12.73 binutils Compiler CVE-2022-3606 I5WLYF 12.77 5.5 risc-v-kernel sig-RISC-V CVE-2022-3606 I5WLXN 12.77 5.5 kernel Kernel CVE-2022-21624 I5WMVR 12.84 3.7 openjdk-latest Compiler CVE-2022-21619 I5WMVP 12.84 3.7 openjdk-latest Compiler CVE-2022-21624 I5WMVM 12.84 3.7 openjdk-11 Compiler CVE-2022-21626 I5WMU2 12.84 5.3 openjdk-latest Compiler CVE-2022-21626 I5WMTY 12.84 5.3 openjdk-11 Compiler CVE-2022-39399 I5WMYV 12.85 3.7 openjdk-11 Compiler CVE-2022-39399 I5WMYG 12.85 3.7 openjdk-latest Compiler CVE-2022-21628 I5WMYC 12.85 5.3 openjdk-latest Compiler CVE-2022-21628 I5WMY2 12.85 5.3 openjdk-11 Compiler CVE-2022-21597 I5WMXW 12.85 5.3 openjdk-11 Compiler CVE-2022-21618 I5WMXA 12.85 5.3 openjdk-latest Compiler CVE-2022-21618 I5WMX4 12.85 5.3 openjdk-11 Compiler CVE-2012-6136 I5WMWP 12.85 5.5 tuned Computing CVE-2017-11552 I5WMZS 12.86 6.5 libmad Others CVE-2018-17828 I5WN2X 12.87 5.5 zziplib Base-service CVE-2018-16548 I5WN1L 12.87 6.5 zziplib Base-service CVE-2022-21619 I5WN4Q 12.88 3.7 openjdk-11 Compiler CVE-2022-35717 I5ZL1K 13.14 7.8 kernel Kernel CVE-2022-42928 I5WR2P 13.65 firefox Application CVE-2022-3624 I5WYKS 14.64 3.3 risc-v-kernel sig-RISC-V CVE-2022-3630 I5WYKI 14.64 5.5 risc-v-kernel sig-RISC-V CVE-2022-3629 I5WYLP 14.65 3.3 risc-v-kernel sig-RISC-V CVE-2022-3629 I5WYLL 14.65 3.3 kernel Kernel CVE-2022-3619 I5X0EY 14.74 4.3 risc-v-kernel sig-RISC-V CVE-2022-3619 I5X0E3 14.74 4.3 kernel Kernel CVE-2022-42432 I5X2IL 14.98 risc-v-kernel sig-RISC-V openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image003.png@01D8F168.5DF4B280]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
221102双周例会议题申请
by Zhang Ethan
31 Oct '22
31 Oct '22
openEuler-22.03-LTS-SP1继承需求范围澄清
1
0
0
0
【QA】双周例会
by openEuler conference
31 Oct '22
31 Oct '22
您好! sig-QA SIG 邀请您参加 2022-11-02 14:15 召开的Zoom会议(自动录制) 会议主题:【QA】双周例会 会议链接:https://us06web.zoom.us/j/83472010433?pwd=bTV6SzRES3NkQzJMWEVtY1dLeUcvQT09
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-QA SIG invites you to attend the Zoom conference(auto recording) will be held at 2022-11-02 14:15, The subject of the conference is 【QA】双周例会, You can join the meeting at
https://us06web.zoom.us/j/83472010433?pwd=bTV6SzRES3NkQzJMWEVtY1dLeUcvQT09
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler update_20221024版本发布公告
by chemingdao
29 Oct '22
29 Oct '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221024发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221024发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221024发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/11/05)提供 update_20221031版本。 openEuler-20.03-LTS-SP1 Update 20221024 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞26个。目前版本分支剩余待修复缺陷62个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85F?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-41849 kernel 4.2 CVE-2022-41742 nginx 7.1 CVE-2022-41741 nginx 7.8 CVE-2022-39260 git 8.8 CVE-2022-39253 git 5.5 CVE-2022-3627 libtiff 6.5 CVE-2022-3626 libtiff 6.5 CVE-2022-3599 libtiff 6.5 CVE-2022-3598 libtiff 6.5 CVE-2022-3597 libtiff 6.5 CVE-2022-3594 kernel 7.5 CVE-2022-3570 libtiff 9.8 CVE-2022-3566 kernel 7.1 CVE-2022-3565 kernel 8 CVE-2022-3564 kernel 8 CVE-2022-3545 kernel 7.8 CVE-2022-3542 kernel 5.5 CVE-2022-3535 kernel 3.5 CVE-2022-3524 kernel 7.5 CVE-2022-3521 kernel 2.5 CVE-2022-3515 libksba 8.1 CVE-2022-20423 kernel 4.6 CVE-2021-46848 libtasn1 9.1 CVE-2022-3517 nodejs-minimatch 7.5 CVE-2022-3555 libX11 7.5 CVE-2022-3554 libX11 7.5 Bugfix: issue 仓库 #I5XX3U:Backport and apply AutoBOLT from openEuler GCC 10.3.1 to openEuler GCC 7.3.1 gcc #I3BQJM:安装kmodtool构建的软件包时出现打印异常,但不影响功能 openEuler-rpm-config #I5XWVP:oec-hardware版本升级至1.1.3 oec-hardware #I5WW82:【openEuler-1.0-LTS】不支持 MegaRAID 9560-16i kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I47I56 yum升级出现dkms的错误告警打印 dkms Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221024 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题4个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85G?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-41849 kernel 4.2 CVE-2022-41742 nginx 7.1 CVE-2022-41741 nginx 7.8 CVE-2022-39260 git 8.8 CVE-2022-39253 git 5.5 CVE-2022-3627 libtiff 6.5 CVE-2022-3626 libtiff 6.5 CVE-2022-3599 libtiff 6.5 CVE-2022-3598 libtiff 6.5 CVE-2022-3597 libtiff 6.5 CVE-2022-3594 kernel 7.5 CVE-2022-3570 libtiff 9.8 CVE-2022-3566 kernel 7.1 CVE-2022-3565 kernel 8 CVE-2022-3564 kernel 8 CVE-2022-3545 kernel 7.8 CVE-2022-3542 kernel 5.5 CVE-2022-3535 kernel 3.5 CVE-2022-3524 kernel 7.5 CVE-2022-3521 kernel 2.5 CVE-2022-3515 libksba 8.1 CVE-2022-20423 kernel 4.6 CVE-2021-46848 libtasn1 9.1 CVE-2022-3517 nodejs-minimatch 7.5 CVE-2022-3555 libX11 7.5 CVE-2022-3554 libX11 7.5 Bugfix: issue 仓库 #I5XX3U:Backport and apply AutoBOLT from openEuler GCC 10.3.1 to openEuler GCC 7.3.1 gcc #I5XWVQ:oec-hardware版本升级至1.1.3 oec-hardware #I5XV88:第三方模块构建热补丁时报错 kpatch #I5WW82:【openEuler-1.0-LTS】不支持 MegaRAID 9560-16i<
https://gitee.com/open_euler/dashboard?issue_id=I5WW82
> kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221024 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞17个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85H?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-41742 nginx 7.1 CVE-2022-41741 nginx 7.8 CVE-2022-39260 git 8.8 CVE-2022-39253 git 5.5 CVE-2022-3627 libtiff 6.5 CVE-2022-3626 libtiff 6.5 CVE-2022-3599 libtiff 6.5 CVE-2022-3598 libtiff 6.5 CVE-2022-3597 libtiff 6.5 CVE-2022-3570 libtiff 9.8 CVE-2022-3515 libksba 8.1 CVE-2022-3165 qemu 6.5 CVE-2022-20423 kernel 4.6 CVE-2021-46848 libtasn1 9.1 CVE-2022-3517 nodejs-minimatch 7.5 CVE-2022-3555 libX11 7.5 CVE-2022-3554 libX11 7.5 Bugfix: issue 仓库 #I5RYNU:删除二进制命令文件包含的RPATH和RUNPATH acl #I5UHVY:例行分析grub2软件包开源补丁 grub2 #I5XWVV:oec-hardware版本升级至1.1.3 oec-hardware #I5WI80:upgrade to jdk11.0.17-8(GA) openjdk-11 #I5UNSG: libbpf软件包开源补丁回合 libbpf openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5Q4S3 [22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 kernel Kernel I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 剩余天数 CVSS评分 软件包 SIG CVE-2022-41849 0.97 4.2 risc-v-kernel sig-RISC-V CVE-2022-41850 0.97 4.7 risc-v-kernel sig-RISC-V CVE-2022-41848 0.98 4.2 risc-v-kernel sig-RISC-V CVE-2022-0778 1.61 7.5 mariadb DB CVE-2022-3529 2.07 7.5 risc-v-kernel sig-RISC-V CVE-2022-3527 2.07 7.5 risc-v-kernel sig-RISC-V CVE-2022-3528 2.07 7.5 risc-v-kernel sig-RISC-V CVE-2022-3534 2.21 8 risc-v-kernel sig-RISC-V CVE-2022-3530 2.21 7.5 risc-v-kernel sig-RISC-V CVE-2022-3545 2.22 7.8 risc-v-kernel sig-RISC-V CVE-2022-3541 2.22 7.8 risc-v-kernel sig-RISC-V CVE-2022-3553 2.57 7.5 xorg-x11-server Desktop CVE-2022-3566 2.65 7.1 risc-v-kernel sig-RISC-V CVE-2022-3567 2.65 7.1 risc-v-kernel sig-RISC-V CVE-2022-3565 2.65 8 risc-v-kernel sig-RISC-V CVE-2022-3564 2.65 8 risc-v-kernel sig-RISC-V CVE-2022-3551 3.09 7.5 xorg-x11-server Desktop CVE-2018-19518 4.09 7.5 php Base-service CVE-2018-19935 4.1 7.5 php Base-service CVE-2022-42468 4.33 9.8 flume sig-bigdata CVE-2022-34169 4.37 7.5 openjdk-1.8.0 Compiler CVE-2022-41420 4.56 5.5 nasm Programming-language CVE-2022-40617 5.34 strongswan Application CVE-2022-3625 5.87 7.8 kernel Kernel CVE-2022-3625 5.87 7.8 risc-v-kernel sig-RISC-V CVE-2022-3623 6.06 7.5 risc-v-kernel sig-RISC-V CVE-2022-3621 6.06 7.5 risc-v-kernel sig-RISC-V CVE-2022-3623 6.06 7.5 kernel Kernel CVE-2022-3621 6.06 7.5 kernel Kernel CVE-2022-3647 6.83 7.5 redis6 sig-bigdata CVE-2022-3647 6.83 7.5 redis5 sig-bigdata CVE-2022-3640 6.83 8.8 risc-v-kernel sig-RISC-V CVE-2022-3635 6.83 7 risc-v-kernel sig-RISC-V CVE-2022-3636 6.83 7.8 risc-v-kernel sig-RISC-V CVE-2022-3635 6.84 7 kernel Kernel CVE-2022-32172 8.14 5.4 zinc sig-Java CVE-2022-32171 8.14 5.4 zinc sig-Java CVE-2022-3424 8.22 risc-v-kernel sig-RISC-V CVE-2022-3577 8.68 7.8 risc-v-kernel sig-RISC-V CVE-2022-3435 9.22 4.3 risc-v-kernel sig-RISC-V CVE-2022-43680 9.43 7.5 expat Base-service CVE-2022-3647 9.94 7.5 redis Others CVE-2019-2684 10.71 5.9 tomcat Application CVE-2022-42703 10.72 5.5 risc-v-kernel sig-RISC-V CVE-2022-41704 10.83 7.5 batik sig-Java CVE-2022-42890 10.86 7.5 batik sig-Java CVE-2022-43750 10.93 7.8 risc-v-kernel sig-RISC-V CVE-1999-0634 12.95 openssh Networking CVE-2022-3466 13.22 cri-o sig-CloudNative CVE-2022-42721 14.1 5.5 risc-v-kernel sig-RISC-V CVE-2022-42721 14.1 5.5 kernel Kernel CVE-2022-42722 14.22 5.5 kernel Kernel CVE-2022-42722 14.22 5.5 risc-v-kernel sig-RISC-V CVE-2022-39229 14.73 4.3 grafana Application openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image002.png@01D8EBB8.F723AD90]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
【请知】openEuler社区服务上新——QuickIssue
by 曹志
27 Oct '22
27 Oct '22
各位好, 社区基础设施服务上新啦, 一个更快捷的ISSUE分类提交小助手——QuickIssue :
https://quickissue.openeuler.org/zh/
(也可以通过
https://www.openeuler.org/zh/
->【社区】 -> 【QuickIssue】跳转) 欢迎大家使用体验 ~~ 过程中有任何问题,欢迎联系 infra(a)openeuler.org 或 g
2
3
0
0
QA-sig 双周例会(11/2号 )议题申报
by 江枫
27 Oct '22
27 Oct '22
22.03-LTS-SP1版本测试策略和测试执行评审
https://gitee.com/openeuler/QA/pulls/288
1
0
0
0
← Newer
1
...
28
29
30
31
32
33
34
...
54
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Results per page:
10
25
50
100
200