mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
List overview
Download
Qa
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
qa@openeuler.org
3 participants
539 discussions
Start a n
N
ew thread
[请知] openEuler社区服务上新:QuickIssue
by George
25 Oct '22
25 Oct '22
各位好, 社区基础设施服务上新啦, 一个更快捷的ISSUE分类提交小助手——QuickIssue : https://quickissue.openeuler.org/zh/ (也可以通过 https://www.openeuler.org/zh/ ->【社区】 -> 【QuickIssue】跳转) 欢迎大家使用体验 ~~ 过程中有任何问题,欢迎联系 infra(a)openeuler.xn--org -ed8oj052d 背景: 随着社区发展,基础设施接到一些社区用户和开发者反馈:完全依赖于代码托管平台的社区ISSUE管理不太方便使用。 主要体现在以下几点: 1.部分社区用户可能没有代码托管平台账号,无法直接提交ISSUE,无形中添加了障碍; 2.托管平台ISSUE筛选功能有待完善,需要一个更懂业务的平台协助筛选; 3.社区用户或开发者在发现问题后不清楚往哪儿提交ISSUE; 4…… 需求分析: 1.在openEuler官网提供一个ISSUE提交入口; 2.不论提交人是否有代码托管平台账号,都可以提交ISSUE; 3.可以指导用户或开发者将ISSUE提交到某个仓库,即便不知道,也有默认的地方可提; 方案与实现: …… (省略)…… 结果:
https://quickissue.openeuler.org/zh/
进一步规划:(二期) 1.上线PR展示工程 2.增加官网悬窗进入 3.增加邮件提交人ISSUE评论通知 4.对接社区账户系统 5……(欢迎补充想法和需求)…… 写在后面的话:
前期基础设施上线的服务 https://bugzilla.openeuler.org/ 使用率较低,且在上述QuickIssue服…
所以计划22年年底下线bugzilla服务,如果有不同意见或者正在使用的情况,烦请及时反馈。 Best Regards Infra - George
1
0
0
0
openEuler update_20221017版本发布公告
by chemingdao
21 Oct '22
21 Oct '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221017发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221017发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221017发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/10/28)提供 update_20221024版本。 openEuler-20.03-LTS-SP1 Update 20221017 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞24个。目前版本分支剩余待修复缺陷62个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZVG?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-42703 kernel 5.5 CVE-2022-42012 dbus 6.5 CVE-2022-42011 dbus 6.5 CVE-2022-42010 dbus 6.5 CVE-2022-41850 kernel 4.7 CVE-2022-41715 golang 4 CVE-2022-37434 mariadb-connector-c 9.8 CVE-2022-3324 vim 7.8 CVE-2022-3297 vim 7.8 CVE-2022-2929 dhcp 6.5 CVE-2022-2928 dhcp 7.5 CVE-2022-2880 golang 5.3 CVE-2022-2879 golang 6.2 CVE-2022-2058 libtiff 6.5 CVE-2022-2056 libtiff 6.5 CVE-2022-20422 kernel 7 CVE-2022-20421 kernel 7.8 CVE-2022-1941 protobuf 7.5 CVE-2020-0198 libexif 7.5 CVE-2020-0181 libexif 7.5 CVE-2020-0093 libexif 5 CVE-2019-9278 libexif 8.8 CVE-2019-1010180 crash 7.8 CVE-2021-33036 hadoop 8.8 Bugfix: issue 仓库 #I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I47I56 yum升级出现dkms的错误告警打印 dkms Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221017 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题3个,已知漏洞21个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZW1?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-42703 kernel 5.5 CVE-2022-41850 kernel 4.7 CVE-2022-41715 golang 4 CVE-2022-37434 mariadb-connector-c 9.8 CVE-2022-3324 vim 7.8 CVE-2022-3297 vim 7.8 CVE-2022-2929 dhcp 6.5 CVE-2022-2928 dhcp 7.5 CVE-2022-2880 golang 5.3 CVE-2022-2879 golang 6.2 CVE-2022-2058 libtiff 6.5 CVE-2022-2056 libtiff 6.5 CVE-2022-20422 kernel 7 CVE-2022-20421 kernel 7.8 CVE-2022-1941 protobuf 7.5 CVE-2020-0198 libexif 7.5 CVE-2020-0181 libexif 7.5 CVE-2020-0093 libexif 5 CVE-2019-9278 libexif 8.8 CVE-2019-1010180 crash 7.8 CVE-2021-33036 hadoop 8.8 Bugfix: issue 仓库 #I5NQEE:虚拟机安装时,环形进度条不转动 anaconda #I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题 kernel #I5UV23:【20.03 LTS SP3】libcareplus升级到1.0.0-13 libcareplus openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 openEuler/kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221017 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞29个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZWL?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-3297 vim 7.8 CVE-2022-3324 vim 7.8 CVE-2022-1941 protobuf 7.5 CVE-2022-37434 mariadb-connector-c 9.8 CVE-2022-2056 libtiff 6.5 CVE-2022-2058 libtiff 6.5 CVE-2022-1184 kernel 5.5 CVE-2022-20421 kernel 7.8 CVE-2022-20422 kernel 7 CVE-2022-3303 kernel 4.7 CVE-2022-3435 kernel 4.3 CVE-2022-41674 kernel 8.1 CVE-2022-41849 kernel 4.2 CVE-2022-41850 kernel 4.7 CVE-2022-42703 kernel 5.5 CVE-2022-42719 kernel 8.8 CVE-2022-42720 kernel 7.8 CVE-2022-42721 kernel 5.5 CVE-2022-2879 golang 6.2 CVE-2022-2880 golang 5.3 CVE-2022-41715 golang 4 CVE-2022-2928 dhcp 7.5 CVE-2022-2929 dhcp 6.5 CVE-2022-42010 dbus 6.5 CVE-2022-42011 dbus 6.5 CVE-2022-42012 dbus 6.5 CVE-2019-10101 crash 7.8 CVE-2021-34337 mailman 7.4 CVE-2021-33036 hadoop 8.8 Bugfix: issue 仓库 #I5NQEE:虚拟机安装时,环形进度条不转动 anaconda #I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题 kernel #I416C7:kernel-rpm-macros 不支持-p |preamble 参数, openEuler-rpm-config #I5LQP4:[22.09-RC1][aarch64/x86_64]安装完成后输入命令“yum grouplist hidden”回显缺少“Installed Environment Groups” 和 “Installed Groups”子项 dnf #I5UYJU: 有不支持的段,导致热补丁编译失败 kpatch #I5TQQR:openEuler-22.03-LTS和openEuler-20.03-LTS-SP1分支spec差异排查和同步 NetworkManager #I5TWH0:【22.03-LTS】NetworkManager主包中存在多余库文件 NetworkManager #I5WBM8:initscripts spec优化 initscripts #I5WMUY:[libpsl] change release number libpsl #I5W498:【OLK-5.10】IO长稳测试中,正常下发读写时出现文件系统错误导致挂载为readonly kernel #I5WN5N:hange default ntp server and correct the default value of RuntimeDirectoryInodesMax systemd openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5Q4S3 [22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 openEuler/kernel Kernel I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB I5VL9Q [22.03-LTS]安装完成后输入命令“yum grouplist hidden”回显缺少“Installed Environment Groups” 和 “Installed Groups”子项 anaconda sig-OS-Builder 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 剩余天数 CVSS评分 软件包 SIG CVE-2022-37026 3.79 9.8 erlang Programming-language CVE-2022-32149 4.87 7.5 golang sig-golang CVE-2022-40674 5.7 9.8 firefox Application CVE-2022-41083 5.78 7.8 jupyter sig-bigdata CVE-2022-3479 5.93 7.5 nss sig-security-facility CVE-2022-42720 5.94 7.8 risc-v-kernel sig-RISC-V CVE-2022-42719 5.94 8.8 kernel Kernel CVE-2022-41674 5.94 8.1 kernel Kernel CVE-2022-42720 5.94 7.8 kernel Kernel CVE-2022-42719 5.94 8.8 risc-v-kernel sig-RISC-V CVE-2022-41674 5.94 8.1 risc-v-kernel sig-RISC-V CVE-2022-39201 6.57 7.5 grafana Application CVE-2022-31130 6.58 7.5 grafana Application CVE-2022-31123 6.73 7.8 grafana Application CVE-2022-3517 7.31 7.5 nodejs-minimatch sig-nodejs CVE-2022-3526 9.44 7.5 kernel Kernel CVE-2022-3522 9.44 7 kernel Kernel CVE-2022-3524 9.44 7.5 kernel Kernel CVE-2022-0778 9.45 7.5 mariadb DB CVE-2022-42969 9.52 7.5 python-py Programming-language CVE-2022-3529 9.91 7.5 risc-v-kernel sig-RISC-V CVE-2022-3527 9.91 7.5 risc-v-kernel sig-RISC-V CVE-2022-3528 9.91 7.5 risc-v-kernel sig-RISC-V CVE-2022-3527 9.91 7.5 kernel Kernel CVE-2022-3528 9.91 7.5 kernel Kernel CVE-2022-3554 10.05 7.5 libX11 Desktop CVE-2022-3545 10.05 7.8 kernel Kernel CVE-2022-3555 10.05 7.5 libX11 Desktop CVE-2022-3541 10.05 7.8 kernel Kernel CVE-2022-3534 10.05 8 kernel Kernel CVE-2022-3530 10.05 7.5 risc-v-kernel sig-RISC-V CVE-2022-3530 10.05 7.5 kernel Kernel CVE-2022-3545 10.06 7.8 risc-v-kernel sig-RISC-V CVE-2022-3541 10.06 7.8 risc-v-kernel sig-RISC-V CVE-2022-3534 10.06 8 risc-v-kernel sig-RISC-V CVE-2022-3553 10.42 7.5 xorg-x11-server Desktop CVE-2022-3566 10.49 7.1 risc-v-kernel sig-RISC-V CVE-2022-3565 10.49 8 risc-v-kernel sig-RISC-V CVE-2022-3566 10.49 7.1 kernel Kernel CVE-2022-3565 10.49 8 kernel Kernel CVE-2022-3564 10.49 8 risc-v-kernel sig-RISC-V CVE-2022-3564 10.49 8 kernel Kernel CVE-2018-14553 10.73 7.5 gd Desktop CVE-2018-1000222 10.73 8.8 gd Desktop CVE-2022-32893 10.78 8.8 webkit2gtk3 Desktop CVE-2022-24107 10.79 7.8 poppler Desktop CVE-2022-24106 10.79 7.8 poppler Desktop CVE-2020-36604 10.79 8.1 nodejs-hoek sig-nodejs CVE-2022-38222 10.8 7.8 poppler Desktop CVE-2018-12015 10.85 7.5 tar Base-service CVE-2021-252893 10.91 7.5 python-pillow sig-python-modules CVE-2021-252891 10.91 7.5 python-pillow sig-python-modules CVE-2022-3551 10.93 7.5 xorg-x11-server Desktop CVE-2022-3594 11.38 7.5 kernel Kernel CVE-2018-5744 11.49 7.5 bind Networking CVE-2022-39260 11.56 8.5 git Base-service CVE-2018-19518 11.93 7.5 php Base-service CVE-2018-19935 11.94 7.5 php Base-service CVE-2022-41420 12.4 5.5 nasm Programming-language CVE-2022-40617 13.19 strongswan Application CVE-2022-20424 13.44 kernel Kernel CVE-2022-20423 13.56 4.6 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image002.png@01D8E590.9E38BF00]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
【QA-SIG】双周例会议题收集
by fanjiachen (A)
19 Oct '22
19 Oct '22
欢迎大家申报本周QA 例会议题 您好! sig-QA SIG 邀请您参加 2022-10-19 14:15 召开的Zoom会议(自动录制) 会议主题:【QA】双周例会 会议链接:https://us06web.zoom.us/j/84280782784?pwd=ZGFnTUwrRUVIMXVlTk9lRUF6RjZDZz09
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
<
http://xn--:https-o88i2063aunuad5e/etherpad.openeuler.org/p/sig-QA-meetings
> 温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
<
更多资讯尽在:https:/openeuler.org/zh/
> Hello! openEuler sig-QA SIG invites you to attend the Zoom conference(auto recording) will be held at 2022-10-19 14:15, The subject of the conference is 【QA】双周例会, You can join the meeting at
https://us06web.zoom.us/j/84280782784?pwd=ZGFnTUwrRUVIMXVlTk9lRUF6RjZDZz09
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
<
http://gitee.com/
>. More information:
https://openeuler.org/en/
1
1
0
0
【QA】双周例会
by openEuler conference
17 Oct '22
17 Oct '22
您好! sig-QA SIG 邀请您参加 2022-10-19 14:15 召开的Zoom会议(自动录制) 会议主题:【QA】双周例会 会议链接:https://us06web.zoom.us/j/84280782784?pwd=ZGFnTUwrRUVIMXVlTk9lRUF6RjZDZz09
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-QA SIG invites you to attend the Zoom conference(auto recording) will be held at 2022-10-19 14:15, The subject of the conference is 【QA】双周例会, You can join the meeting at
https://us06web.zoom.us/j/84280782784?pwd=ZGFnTUwrRUVIMXVlTk9lRUF6RjZDZz09
. Add topics at
https://etherpad.openeuler.org/p/sig-QA-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler update_20221012 版本发布公告
by chemingdao
15 Oct '22
15 Oct '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221012发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221012 发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221012发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/10/21)提供 update_20221017版本。 openEuler-20.03-LTS-SP1 Update 20221012 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞24个。目前版本分支剩余待修复缺陷66个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ2?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-39842 kernel 7.8 CVE-2022-38178 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-3352 vim 7.8 CVE-2022-3303 kernel 4.7 CVE-2022-3296 vim 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-30767 uboot-tools 9.8 CVE-2022-2906 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2795 bind 7.5 CVE-2022-2663 kernel 5.3 CVE-2022-1184 kernel 5.5 CVE-2021-3638 qemu 6.5 CVE-2021-25220 dhcp 6.8 CVE-2021-25219 dhcp 5.3 CVE-2021-25215 dhcp 7.5 CVE-2021-25214 dhcp 6.5 CVE-2019-14584 edk2 7.8 CVE-2019-11098 edk2 6.8 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-21797 python-joblib 7.3 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware #I5TY3L:【openEuler-1.0-LTS】bd_link_disk_holder创建sysfs触发unable to handle page fault kernel #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I47I56 yum升级出现dkms的错误告警打印 dkms Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4CM78 [20.03-LTS-SP1]389-ds-base和389-ds-base-legacy-tools包的部分命令执行返回No instances found in /etc/sysconfig three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4NNTR [SP1][x86/arm]执行isula pull busybox,报错"fetch and parse manifest failed" iSulad iSulad I4NO1Z 【SP1-arm/x86】openhpi升级有报错信息 openhpi System-tool I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5O40D 【20.03 SP1】linux-sgx-driver在20.03 SP1分支安装有异常告警 linux-sgx-driver sig-confidential-computing I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221012 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题10个,已知漏洞24个。目前版本分支剩余待修复缺陷15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ3?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-39842 kernel 7.8 CVE-2022-38178 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-3352 vim 7.8 CVE-2022-3303 kernel 4.7 CVE-2022-3296 vim 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-30767 uboot-tools 9.8 CVE-2022-2906 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2795 bind 7.5 CVE-2022-2663 kernel 5.3 CVE-2022-1184 kernel 5.5 CVE-2021-3638 qemu 6.5 CVE-2021-25220 dhcp 6.8 CVE-2021-25219 dhcp 5.3 CVE-2021-25215 dhcp 7.5 CVE-2021-25214 dhcp 6.5 CVE-2019-14584 edk2 7.8 CVE-2019-11098 edk2 6.8 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-21797 python-joblib 7.3 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 #I5P7EI:【openEuler-22.09-RC3】【arm/x86】lxc 软件包 "-?" 参数执行返回"invalid option" lxc #I5S705:设置rootfs maskedpath与设置rootfs ro顺序错误 lxc #I5UTFY:告警处理 lcr #I5PY6W:isula 启动容器内执行env,缺少HOSTNAME变量,且直接获取HOSTNAME变量均为localhost iSulad #I5TIEF:isulad使用devicemapper,磁盘处理较慢时可能出现踩内存 iSulad #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware #I5TY3L:【openEuler-1.0-LTS】bd_link_disk_holder创建sysfs触发unable to handle page fault kernel #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp #I5VEOW:20.03 spc3 abseil-cpp安装后,缺少absl_dynamic_annotations库 grpc #I5VEOZ:openeuler 20.03 sp3 aarch64 使用pcs控制HA集群,服务无法自动漂移问题 pacemaker openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 openEuler/kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5RHBG 【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错 iSulad iSulad I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221012 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题12个,已知漏洞23个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ4?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-3296 vim 7.8 CVE-2022-3352 vim 7.8 CVE-2022-30767 uboot-tools 9.8 CVE-2021-3638 qemu 6.5 CVE-2022-2962 qemu 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-3239 kernel 7.8 CVE-2019-11098 edk2 6.8 CVE-2021-25214 dhcp 6.5 CVE-2021-25215 dhcp 7.5 CVE-2021-25219 dhcp 5.3 CVE-2021-25220 dhcp 6.8 CVE-2022-2795 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2906 bind 7.5 CVE-2022-3080 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-38178 bind 7.5 CVE-2022-3190 wireshark 5.5 CVE-2022-21797 python-joblib 7.3 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 #I5PY6W:isula 启动容器内执行env,缺少HOSTNAME变量,且直接获取HOSTNAME变量均为localhost iSulad #I5TIEF:isulad使用devicemapper,磁盘处理较慢时可能出现踩内存 iSulad #I5U7EU:优化prep处理逻辑,将libtoolize以及autoreconf移到build中 pcre #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware #I5MGRL:[22.09 LTS][Train][Wallaby]openstack-dashboard默认使用/usr/bin/python,导致httpd无法启动 openstack-horizon #I5UYZK:优化prep处理逻辑,将tzdataxxxx-rearguard.tar.gz文件内容的生成移到build中 tzdata #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp #I5DZV6:255个cpu的虚拟机,触发softlockup复位后vmcore-dmesg日志未能生成 kexec-tools #I5AN49: 升级到openEuler-22.03-LTS,kdump服务异常,错误提示存在非法参数kbox_mem kexec-tools #I5U64B:优化kexec-tools的patch,将ARM场景的宏开关移到代码中 kexec-tools #I5KIZ2:rsyslog上游社区补丁回合并使能%check rsyslog #I5TP3M:rsyslog的prep中移除文档的build操作 rsyslog openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5TM41 [22.03-LTS]先安装mariadb-server,卸载后再安装mysql-server,mysqld服务启动失败 mysql Others I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-40626 I5R4GB 0.17 4 zabbix Base-service CVE-2022-21222 I5U305 0.44 7.5 pcs sig-Ha CVE-2022-40476 I5R4K9 0.45 5.5 risc-v-kernel sig-RISC-V CVE-2021-4127 I5R6GY 0.58 thunderbird sig-desktop-apps CVE-2022-36402 I5RJWC 2.21 5.5 risc-v-kernel sig-RISC-V CVE-2022-34169 I5HV9H 4.37 7.5 openjdk-1.8.0 Compiler CVE-2022-42004 I5U706 4.56 7.5 jackson-databind sig-Java CVE-2022-20421 I5U713 4.57 7.8 kernel Kernel CVE-2022-42003 I5U709 4.57 7.5 jackson-databind sig-Java CVE-2022-20422 I5U71M 4.58 7 kernel Kernel CVE-2022-2928 I5U80N 5.08 7.5 dhcp Networking CVE-2021-34337 I5S654 6.37 mailman Application CVE-2022-23084 I5S79U 6.55 risc-v-kernel sig-RISC-V CVE-2022-23086 I5S7L9 6.56 risc-v-kernel sig-RISC-V CVE-2022-23085 I5S7KN 6.56 risc-v-kernel sig-RISC-V CVE-2022-34305 I5SD31 6.86 6.1 tomcat Application CVE-2022-41218 I5SDEB 6.87 5.5 risc-v-kernel sig-RISC-V CVE-2022-3171 I5UBLT 6.96 7.5 protobuf sig-CloudNative CVE-2022-31008 I5UBQ6 7 7.5 rabbitmq-server Application CVE-2022-35957 I5SELV 7.08 6.6 grafana Application CVE-2022-36062 I5SELR 7.08 3.8 grafana Application CVE-2022-3155 I5SELN 7.08 CVE-2022-3297 I5T0SC 7.12 7.8 vim Base-service CVE-2022-1941 I5SV4T 7.12 7.5 protobuf sig-CloudNative CVE-2022-3277 I5SNDX 8.45 openstack-neutron sig-openstack CVE-2022-2785 I5SVBG 9 5.5 risc-v-kernel sig-RISC-V CVE-2022-2785 I5SVBF 9 5.5 kernel Kernel CVE-2022-21824 I5USM1 9.57 8.2 mysql Others CVE-2022-3303 I5T9C4 12.2 4.7 risc-v-kernel sig-RISC-V CVE-2022-3303 I5T9C3 12.2 4.7 kernel Kernel CVE-2022-39282 I5VGTX 12.58 7.5 freerdp Application CVE-2022-39283 I5VGTP 12.58 7.5 freerdp Application CVE-2021-3481 I5TEAF 12.78 5.4 qt5 Desktop CVE-2022-41083 I5VK2C 12.8 7.8 jupyter sig-bigdata CVE-2022-3078 I5TEMI 12.8 5.5 risc-v-kernel sig-RISC-V CVE-2020-10136 I5TF8O 12.83 5.3 kernel Kernel CVE-2019-2101 I5TF8C 12.83 5.5 kernel Kernel CVE-2022-21233 I5TF80 12.83 5.5 risc-v-kernel sig-RISC-V CVE-2020-26143 I5TGQO 12.94 6.5 kernel Kernel CVE-2020-26140 I5TGQL 12.94 6.5 kernel Kernel CVE-2022-39835 I5THMV 13.35 5.3 gajim sig-mate-desktop CVE-2022-35255 I5TOU4 13.95 nodejs sig-nodejs CVE-2022-35256 I5TOU1 13.95 CVE-2021-27854 I5TP92 14.05 4.7 risc-v-kernel sig-RISC-V CVE-2021-27854 I5TP8Z 14.05 4.7 kernel Kernel CVE-2021-27861 I5TPBD 14.06 4.7 risc-v-kernel sig-RISC-V CVE-2021-27861 I5TPB2 14.06 4.7 kernel Kernel CVE-2022-3287 I5TPE8 14.07 6.5 fwupd System-tool CVE-2021-27853 I5TPCA 14.07 4.7 risc-v-kernel sig-RISC-V CVE-2021-27853 I5TPC2 14.07 4.7 kernel Kernel CVE-2021-27862 I5TPEG 14.08 CVE-2022-31629 I5TPJZ 14.46 6.5 php Base-service CVE-2021-43980 I5TQD3 14.53 5.3 tomcat Application CVE-2022-31628 I5TRIM 14.58 5.5 php Base-service CVE-2022-31628 I5TSDJ 14.62 5.5 php Base-service CVE-2022-1520 I5TUGK 14.79 thunderbird sig-desktop-apps CVE-2022-2805 I5TUGD 14.79 ovirt-engine oVirt CVE-2022-1736 I5TUG3 14.79 gnome-remote-desktop GNOME CVE-2022-28289 I5TUET 14.79 firefox Application CVE-2022-3306 I5TUZS 14.82 chromium Application CVE-2022-1834 I5TUWK 14.82 thunderbird sig-desktop-apps openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image002.png@01D8E0A5.3FDFB200]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
撤回: openEuler update_20221012 版本发布公告
by chemingdao
15 Oct '22
15 Oct '22
chemingdao 将撤回邮件“openEuler update_20221012 版本发布公告”。
1
0
0
0
撤回: openEuler update_20221012 版本发布公告
by chemingdao
15 Oct '22
15 Oct '22
chemingdao 将撤回邮件“openEuler update_20221012 版本发布公告”。
1
0
0
0
openEuler update_20221012 版本发布公告
by chemingdao
14 Oct '22
14 Oct '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20221012发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20221012 发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20221012发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/10/21)提供 update_20221017版本。 openEuler-20.03-LTS-SP1 Update 20221012 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞24个。目前版本分支剩余待修复缺陷66个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ2?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-39842 kernel 7.8 CVE-2022-38178 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-3352 vim 7.8 CVE-2022-3303 kernel 4.7 CVE-2022-3296 vim 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-30767 uboot-tools 9.8 CVE-2022-2906 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2795 bind 7.5 CVE-2022-2663 kernel 5.3 CVE-2022-1184 kernel 5.5 CVE-2021-3638 qemu 6.5 CVE-2021-25220 dhcp 6.8 CVE-2021-25219 dhcp 5.3 CVE-2021-25215 dhcp 7.5 CVE-2021-25214 dhcp 6.5 CVE-2019-14584 edk2 7.8 CVE-2019-11098 edk2 6.8 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-21797 python-joblib 7.3 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 责任田 #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware openEuler #I5TY3L:【openEuler-1.0-LTS】bd_link_disk_holder创建sysfs触发unable to handle page fault kernel EulerOS #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp EulerOS openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I47I56 yum升级出现dkms的错误告警打印 dkms Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4CM78 [20.03-LTS-SP1]389-ds-base和389-ds-base-legacy-tools包的部分命令执行返回No instances found in /etc/sysconfig three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4NNTR [SP1][x86/arm]执行isula pull busybox,报错"fetch and parse manifest failed" iSulad iSulad I4NO1Z 【SP1-arm/x86】openhpi升级有报错信息 openhpi System-tool I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5O40D 【20.03 SP1】linux-sgx-driver在20.03 SP1分支安装有异常告警 linux-sgx-driver sig-confidential-computing I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20221012 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题10个,已知漏洞24个。目前版本分支剩余待修复缺陷15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ3?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-39842 kernel 7.8 CVE-2022-38178 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-3352 vim 7.8 CVE-2022-3303 kernel 4.7 CVE-2022-3296 vim 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-30767 uboot-tools 9.8 CVE-2022-2906 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2795 bind 7.5 CVE-2022-2663 kernel 5.3 CVE-2022-1184 kernel 5.5 CVE-2021-3638 qemu 6.5 CVE-2021-25220 dhcp 6.8 CVE-2021-25219 dhcp 5.3 CVE-2021-25215 dhcp 7.5 CVE-2021-25214 dhcp 6.5 CVE-2019-14584 edk2 7.8 CVE-2019-11098 edk2 6.8 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-21797 python-joblib 7.3 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 #I5P7EI:【openEuler-22.09-RC3】【arm/x86】lxc 软件包 "-?" 参数执行返回"invalid option" lxc #I5S705:设置rootfs maskedpath与设置rootfs ro顺序错误 lxc #I5UTFY:告警处理 lcr #I5PY6W:isula 启动容器内执行env,缺少HOSTNAME变量,且直接获取HOSTNAME变量均为localhost iSulad #I5TIEF:isulad使用devicemapper,磁盘处理较慢时可能出现踩内存 iSulad #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware #I5TY3L:【openEuler-1.0-LTS】bd_link_disk_holder创建sysfs触发unable to handle page fault kernel #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp #I5VEOW:20.03 spc3 abseil-cpp安装后,缺少absl_dynamic_annotations库 grpc #I5VEOZ:openeuler 20.03 sp3 aarch64 使用pcs控制HA集群,服务无法自动漂移问题 pacemaker openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 openEuler/kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5RHBG 【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错 iSulad iSulad I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility openEuler-22.03-LTS Update 20221012 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题12个,已知漏洞23个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5UQZ4?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-3296 vim 7.8 CVE-2022-3352 vim 7.8 CVE-2022-30767 uboot-tools 9.8 CVE-2021-3638 qemu 6.5 CVE-2022-2962 qemu 7.8 CVE-2022-3172 kubernetes 5.1 CVE-2022-3239 kernel 7.8 CVE-2019-11098 edk2 6.8 CVE-2021-25214 dhcp 6.5 CVE-2021-25215 dhcp 7.5 CVE-2021-25219 dhcp 5.3 CVE-2021-25220 dhcp 6.8 CVE-2022-2795 bind 7.5 CVE-2022-2881 bind 8.2 CVE-2022-2906 bind 7.5 CVE-2022-3080 bind 7.5 CVE-2022-38177 bind 7.5 CVE-2022-38178 bind 7.5 CVE-2022-3190 wireshark 5.5 CVE-2022-21797 python-joblib 7.3 CVE-2022-37797 lighttpd 7.5 CVE-2022-30550 dovecot 6.8 CVE-2022-3213 ImageMagick 5.5 Bugfix: issue 仓库 #I5PY6W:isula 启动容器内执行env,缺少HOSTNAME变量,且直接获取HOSTNAME变量均为localhost iSulad #I5TIEF:isulad使用devicemapper,磁盘处理较慢时可能出现踩内存 iSulad #I5U7EU:优化prep处理逻辑,将libtoolize以及autoreconf移到build中 pcre #I5TK7K:Submit yaml file into this repository: oec-hardware oec-hardware #I5MGRL:[22.09 LTS][Train][Wallaby]openstack-dashboard默认使用/usr/bin/python,导致httpd无法启动 openstack-horizon #I5UYZK:优化prep处理逻辑,将tzdataxxxx-rearguard.tar.gz文件内容的生成移到build中 tzdata #I5TTB0:net-snmp补丁回合,修复snmpd命令偶现core问题 net-snmp #I5DZV6:255个cpu的虚拟机,触发softlockup复位后vmcore-dmesg日志未能生成 kexec-tools #I5AN49: 升级到openEuler-22.03-LTS,kdump服务异常,错误提示存在非法参数kbox_mem kexec-tools #I5U64B:优化kexec-tools的patch,将ARM场景的宏开关移到代码中 kexec-tools #I5KIZ2:rsyslog上游社区补丁回合并使能%check rsyslog #I5TP3M:rsyslog的prep中移除文档的build操作 rsyslog openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5G9CY 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I5LKKX libbluray build problem in openEuler:22.03:LTS libbluray Desktop I5LKM6 libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop I5LKY8 yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded I5QKGT 【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 kmod-drbd90 sig-Ha I5RHYO 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife I5TM41 [22.03-LTS]先安装mariadb-server,卸载后再安装mysql-server,mysqld服务启动失败 mysql Others I5TMFF [22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 mariadb DB 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-40626 I5R4GB 0.17 4 zabbix Base-service CVE-2022-21222 I5U305 0.44 7.5 pcs sig-Ha CVE-2022-40476 I5R4K9 0.45 5.5 risc-v-kernel sig-RISC-V CVE-2021-4127 I5R6GY 0.58 thunderbird sig-desktop-apps CVE-2022-36402 I5RJWC 2.21 5.5 risc-v-kernel sig-RISC-V CVE-2022-34169 I5HV9H 4.37 7.5 openjdk-1.8.0 Compiler CVE-2022-42004 I5U706 4.56 7.5 jackson-databind sig-Java CVE-2022-20421 I5U713 4.57 7.8 kernel Kernel CVE-2022-42003 I5U709 4.57 7.5 jackson-databind sig-Java CVE-2022-20422 I5U71M 4.58 7 kernel Kernel CVE-2022-2928 I5U80N 5.08 7.5 dhcp Networking CVE-2021-34337 I5S654 6.37 mailman Application CVE-2022-23084 I5S79U 6.55 risc-v-kernel sig-RISC-V CVE-2022-23086 I5S7L9 6.56 risc-v-kernel sig-RISC-V CVE-2022-23085 I5S7KN 6.56 risc-v-kernel sig-RISC-V CVE-2022-34305 I5SD31 6.86 6.1 tomcat Application CVE-2022-41218 I5SDEB 6.87 5.5 risc-v-kernel sig-RISC-V CVE-2022-3171 I5UBLT 6.96 7.5 protobuf sig-CloudNative CVE-2022-31008 I5UBQ6 7 7.5 rabbitmq-server Application CVE-2022-35957 I5SELV 7.08 6.6 grafana Application CVE-2022-36062 I5SELR 7.08 3.8 grafana Application CVE-2022-3155 I5SELN 7.08 CVE-2022-3297 I5T0SC 7.12 7.8 vim Base-service CVE-2022-1941 I5SV4T 7.12 7.5 protobuf sig-CloudNative CVE-2022-3277 I5SNDX 8.45 openstack-neutron sig-openstack CVE-2022-2785 I5SVBG 9 5.5 risc-v-kernel sig-RISC-V CVE-2022-2785 I5SVBF 9 5.5 kernel Kernel CVE-2022-21824 I5USM1 9.57 8.2 mysql Others CVE-2022-3303 I5T9C4 12.2 4.7 risc-v-kernel sig-RISC-V CVE-2022-3303 I5T9C3 12.2 4.7 kernel Kernel CVE-2022-39282 I5VGTX 12.58 7.5 freerdp Application CVE-2022-39283 I5VGTP 12.58 7.5 freerdp Application CVE-2021-3481 I5TEAF 12.78 5.4 qt5 Desktop CVE-2022-41083 I5VK2C 12.8 7.8 jupyter sig-bigdata CVE-2022-3078 I5TEMI 12.8 5.5 risc-v-kernel sig-RISC-V CVE-2020-10136 I5TF8O 12.83 5.3 kernel Kernel CVE-2019-2101 I5TF8C 12.83 5.5 kernel Kernel CVE-2022-21233 I5TF80 12.83 5.5 risc-v-kernel sig-RISC-V CVE-2020-26143 I5TGQO 12.94 6.5 kernel Kernel CVE-2020-26140 I5TGQL 12.94 6.5 kernel Kernel CVE-2022-39835 I5THMV 13.35 5.3 gajim sig-mate-desktop CVE-2022-35255 I5TOU4 13.95 nodejs sig-nodejs CVE-2022-35256 I5TOU1 13.95 CVE-2021-27854 I5TP92 14.05 4.7 risc-v-kernel sig-RISC-V CVE-2021-27854 I5TP8Z 14.05 4.7 kernel Kernel CVE-2021-27861 I5TPBD 14.06 4.7 risc-v-kernel sig-RISC-V CVE-2021-27861 I5TPB2 14.06 4.7 kernel Kernel CVE-2022-3287 I5TPE8 14.07 6.5 fwupd System-tool CVE-2021-27853 I5TPCA 14.07 4.7 risc-v-kernel sig-RISC-V CVE-2021-27853 I5TPC2 14.07 4.7 kernel Kernel CVE-2021-27862 I5TPEG 14.08 CVE-2022-31629 I5TPJZ 14.46 6.5 php Base-service CVE-2021-43980 I5TQD3 14.53 5.3 tomcat Application CVE-2022-31628 I5TRIM 14.58 5.5 php Base-service CVE-2022-31628 I5TSDJ 14.62 5.5 php Base-service CVE-2022-1520 I5TUGK 14.79 thunderbird sig-desktop-apps CVE-2022-2805 I5TUGD 14.79 ovirt-engine oVirt CVE-2022-1736 I5TUG3 14.79 gnome-remote-desktop GNOME CVE-2022-28289 I5TUET 14.79 firefox Application CVE-2022-3306 I5TUZS 14.82 chromium Application CVE-2022-1834 I5TUWK 14.82 thunderbird sig-desktop-apps openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image004.png@01D8E00D.08AB7280]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler update_20220919 版本发布公告
by chemingdao
24 Sep '22
24 Sep '22
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20220919发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20220919 发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20220919发布情况及待修复缺陷 4、openEuler 关键组件待修复CVE 清单 5、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2022/09/30)提供 update_20220926版本。 openEuler-20.03-LTS-SP1 Update 20220919 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题11个,已知漏洞37个。目前版本分支剩余待修复缺陷67个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ROVZ?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2022-40674 expat 9.8 CVE-2022-36109 docker 6.3 CVE-2022-3202 kernel 7.1 CVE-2022-27664 golang 7.5 CVE-2022-2520 libtiff 6.5 CVE-2022-1292 linux-sgx 9.8 CVE-2022-0778 shim 7.5 CVE-2022-0322 kernel 5.5 CVE-2021-45868 kernel 5.5 CVE-2021-4157 kernel 5.9 CVE-2021-3894 kernel 5.5 CVE-2021-3712 shim 7.4 CVE-2021-3656 kernel 8.8 CVE-2021-3505 libtpms 5.5 CVE-2021-33503 python-pip 7.5 CVE-2021-23840 shim 7.5 CVE-2020-1971 shim 5.9 CVE-2020-15025 ntp 4.9 CVE-2020-14422 python-pip 5.9 CVE-2018-0732 shim 7.5 CVE-2017-3735 shim 5.3 CVE-2022-40320 libconfuse 8.8 CVE-2021-45105 log4j 7.5 CVE-2021-44832 log4j 6.6 CVE-2021-22918 nodejs 5.3 CVE-2021-20191 ansible 5.5 CVE-2020-1753 ansible 5.5 CVE-2020-1740 ansible 4.7 CVE-2020-1739 ansible 3.9 CVE-2020-1737 ansible 7.8 CVE-2020-1735 ansible 4.6 CVE-2020-10729 ansible 5.5 CVE-2020-10684 ansible 7.1 CVE-2019-14904 ansible 7.3 CVE-2022-2735 pcs 7.8 CVE-2021-44228 flink 10 CVE-2020-36403 htslib 8.8 Bugfix: issue 仓库 #I5RPNP:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RPNP
> python3 #I5RPRZ:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RPRZ
> libxml2 #I5QU41:安全扫描出postfix的许多文件需要对rpath进行处理<
https://gitee.com/open_euler/dashboard?issue_id=I5QU41
> postfix #I5NUO6:注意spec中changelog撰写规范<
https://gitee.com/open_euler/dashboard?issue_id=I5NUO6
> libproxy #I5QIKV:【20.03 SP1 update20220907】sgx-pck-id-retrieval-tool升级有Error信息<
https://gitee.com/open_euler/dashboard?issue_id=I5QIKV
> linux-sgx #I4M3KE:[20.03-lts-sp1]卸载abrt-addon-ccpp报错:Failed to disable unit: Unit file abrt-ccpp.service does not exist.<
https://gitee.com/open_euler/dashboard?issue_id=I4M3KE
> abrt #I4NO1Z:【SP1-arm/x86】openhpi升级有报错信息<
https://gitee.com/open_euler/dashboard?issue_id=I4NO1Z
> openhpi #I5RV05:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RV05
> libseccomp #I5O7TI:【openEuler-20.03-LTS-SP1 】[arm/x86]traffic_layout remove core dump<
https://gitee.com/open_euler/dashboard?issue_id=I5O7TI
> trafficserver #I5QPB7:【openEuler-20.03-LTS-SP1】【arm/x86】passenger 软件包命令行执行报错<
https://gitee.com/open_euler/dashboard?issue_id=I5QPB7
> passenger #I5SEBM:update oec hardware version to 1.1.2-4<
https://gitee.com/open_euler/dashboard?issue_id=I5SEBM
> oec-hardware openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I44RHB large loop in OBJ_obj2txt openssl sig-security-facility I44RIX large loop in bn_lshift_fixed_top openssl sig-security-facility I47I56 yum升级出现dkms的错误告警打印 dkms Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4CJX9 [20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 three-eight-nine-ds-base Application I4CM78 [20.03-LTS-SP1]389-ds-base和389-ds-base-legacy-tools包的部分命令执行返回No instances found in /etc/sysconfig three-eight-nine-ds-base Application I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F8ZI heap-buffer-overflow in get_word_rgb_row libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4FRSL Undefined-shift in bitset_set augeas Desktop I4FT5J Timeout in fa_from_re augeas Desktop I4FT5U stack overflow in fa_from_re augeas Desktop I4FT61 stack overflow in re_case_expand augeas Desktop I4FT67 memleaks in ref_make_ref augeas Desktop I4FT6B SEGV in re_case_expand augeas Desktop I4FT6F stack overflow in parse_concat_exp augeas Desktop I4FT7B stack overflow in calc_eclosure_iter augeas Desktop I4FT8E stack overflow in peek_token augeas Desktop I4FT8P stack overflow in parse_path_expr augeas Desktop I4FT97 Out of memory in ns_from_locpath augeas Desktop I4FT9A SEGV in eval_expr augeas Desktop I4FT9C SEGV in tree_prev augeas Desktop I4FT9G stack overflow in check_expr augeas Desktop I4FT9I stack overflow in free_expr augeas Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4G5TL stack-buffer-overflow in redisvFormatCommand hiredis Base-service I4G5U2 AddressSanitizer CHECK failed in sdscatvprintf hiredis Base-service I4G5UN SEGV in redisvFormatCommand hiredis Base-service I4G5WG AddressSanitizer CHECK failed in sdscatlen hiredis Base-service I4G5XO Attempting free wild-addr in hi_free hiredis Base-service I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4KT2A integer overflow in luaV_execute lua Base-service I4KT3D integer overflow in intarith lua Base-service I4KT3Q Division by zero in luaV_execute lua Base-service I4KT40 Timeout in luaV_finishget lua Base-service I4M3KE [20.03-lts-sp1]卸载abrt-addon-ccpp报错:Failed to disable unit: Unit file abrt-ccpp.service does not exist. abrt Application I4NNTR [SP1][x86/arm]执行isula pull busybox,报错"fetch and parse manifest failed" iSulad iSulad I4NO1Z 【SP1-arm/x86】openhpi升级有报错信息 openhpi System-tool I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5G81X 【20.03 SP1】selinux-policy卸载异常 selinux-policy sig-security-facility I5GT2K 【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 pcp Application I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JNSL 【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“ httpd Networking I5O40D 【20.03 SP1】linux-sgx-driver在20.03 SP1分支安装有异常告警 linux-sgx-driver sig-confidential-computing I5Q5D1 【20.03 SP1】ibus在sp1分支安装有异常告警 ibus Desktop openEuler-20.03-LTS-SP3 Update 20220919 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题8个,已知漏洞108个。目前版本分支剩余待修复缺陷18个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ROW0?from=project-i…
CVE修复: 需求类型 软件包 CVSS评分 CVE-2022-40674 expat 9.8 CVE-2022-36109 docker 6.3 CVE-2022-3202 kernel 7.1 CVE-2022-27664 golang 7.5 CVE-2022-2520 libtiff 6.5 CVE-2022-1292 linux-sgx 9.8 CVE-2022-0778 shim 7.5 CVE-2022-0322 kernel 5.5 CVE-2021-3894 kernel 5.5 CVE-2021-3712 shim 7.4 CVE-2021-33503 python-pip 7.5 CVE-2021-23840 shim 7.5 CVE-2020-1971 shim 5.9 CVE-2020-15025 ntp 4.9 CVE-2020-14422 python-pip 5.9 CVE-2018-0732 shim 7.5 CVE-2017-3735 shim 5.3 CVE-2022-40320 libconfuse 8.8 CVE-2021-45105 log4j 7.5 CVE-2021-45046 log4j 3.7 CVE-2021-44832 log4j 6.6 CVE-2021-44227 mailman 8.8 CVE-2021-43813 grafana 4.3 CVE-2021-43809 rubygem-bundler 7.3 CVE-2021-43797 netty 6.5 CVE-2021-43332 mailman 6.5 CVE-2021-43331 mailman 6.1 CVE-2021-42717 mod_security 7.5 CVE-2021-42550 logback 6.6 CVE-2021-4048 lapack 5.9 CVE-2021-39226 grafana 7.3 CVE-2021-37623 exiv2 5.5 CVE-2021-37622 exiv2 5.5 CVE-2021-37621 exiv2 5.5 CVE-2021-37620 exiv2 5.5 CVE-2021-37618 exiv2 5.5 CVE-2021-37616 exiv2 5.5 CVE-2021-37615 exiv2 5.5 CVE-2021-35648 mysql 4.9 CVE-2021-35647 mysql 4.9 CVE-2021-35646 mysql 4.9 CVE-2021-35645 mysql 4.9 CVE-2021-35644 mysql 4.9 CVE-2021-35643 mysql 4.9 CVE-2021-35642 mysql 4.9 CVE-2021-35641 mysql 4.9 CVE-2021-35640 mysql 2.7 CVE-2021-35639 mysql 4.9 CVE-2021-35638 mysql 4.9 CVE-2021-35637 mysql 4.9 CVE-2021-35636 mysql 4.9 CVE-2021-35635 mysql 4.9 CVE-2021-35634 mysql 4.9 CVE-2021-35633 mysql 2.7 CVE-2021-35632 mysql 4.4 CVE-2021-35631 mysql 4.9 CVE-2021-35630 mysql 4.9 CVE-2021-35628 mysql 4.9 CVE-2021-35627 mysql 4.9 CVE-2021-35626 mysql 4.9 CVE-2021-35625 mysql 2.7 CVE-2021-35624 mysql 4.9 CVE-2021-35623 mysql 2.7 CVE-2021-35622 mysql 4.9 CVE-2021-35621 mysql 6.3 CVE-2021-35618 mysql 1.8 CVE-2021-35612 mysql 5.5 CVE-2021-35610 mysql 7.1 CVE-2021-35608 mysql 5.3 CVE-2021-35607 mysql 6.5 CVE-2021-35604 mysql 5.5 CVE-2021-35602 mysql 5 CVE-2021-35597 mysql 6.5 CVE-2021-35596 mysql 4.9 CVE-2021-35591 mysql 4.9 CVE-2021-35577 mysql 4.9 CVE-2021-35575 mysql 4.9 CVE-2021-35546 mysql 4.9 CVE-2021-34335 exiv2 5.5 CVE-2021-34334 exiv2 5.5 CVE-2021-32815 exiv2 5.5 CVE-2021-31292 exiv2 7.5 CVE-2021-2481 mysql 6.5 CVE-2021-2479 mysql 4.9 CVE-2021-2478 mysql 4.9 CVE-2021-2471 mysql 5.9 CVE-2019-13504 exiv2 6.5 CVE-2019-13108 exiv2 6.5 CVE-2021-4011 xorg-x11-server 7.8 CVE-2021-4010 xorg-x11-server 7.8 CVE-2021-4009 xorg-x11-server 7.8 CVE-2021-4008 xorg-x11-server 7.8 CVE-2022-2735 pcs 7.8 CVE-2021-41099 redis5 7.5 CVE-2021-41099 redis6 7.5 CVE-2021-39358 gfbgraph 5.9 CVE-2021-32762 redis5 8.8 CVE-2021-32762 redis6 8.8 CVE-2021-32687 redis5 7.5 CVE-2021-32687 redis6 7.5 CVE-2021-32675 redis5 7.5 CVE-2021-32675 redis6 7.5 CVE-2021-32628 redis5 7.5 CVE-2021-32628 redis6 7.5 CVE-2021-32627 redis5 7.5 CVE-2021-32627 redis6 7.5 CVE-2021-32626 redis5 8.8 CVE-2020-36403 htslib 8.8 Bugfix: issue 仓库 #I5RPNP:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RPNP
> python3 #I5RPRZ:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RPRZ
> libxml2 #I5QU41:安全扫描出postfix的许多文件需要对rpath进行处理<
https://gitee.com/open_euler/dashboard?issue_id=I5QU41
> postfix #I5NUO6:注意spec中changelog撰写规范<
https://gitee.com/open_euler/dashboard?issue_id=I5NUO6
> libproxy #I5RV05:spec文件里recommend了help文件,事实上不需要该依赖<
https://gitee.com/open_euler/dashboard?issue_id=I5RV05
> libseccomp #I5O7IX:【openEuler-20.03-LTS-SP3 】[arm/x86]traffic_layout remove core dump<
https://gitee.com/open_euler/dashboard?issue_id=I5O7IX
> trafficserver #I5QPA1:【openEuler-20.03-LTS-sp3】【arm/x86】passenger 软件包命令行执行报错<
https://gitee.com/open_euler/dashboard?issue_id=I5QPA1
> passenger #I5SEBM:update oec hardware version to 1.1.2-4<
https://gitee.com/open_euler/dashboard?issue_id=I5SEBM
> oec-hardware openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4RVHE losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备 util-linux Base-service I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5JBJ9 【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 ovirt-engine oVirt I5JLNF 【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 ovirt-engine oVirt I5JLRQ 【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 ovirt-engine oVirt I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5NU6W [20.03-LTS-SP3]dnf无法安装libtirpc-devel dnf sig-OS-Builder I5PHJA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 hunspell Desktop I5PT12 [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 ima-evm-utils Base-service I5PUIA [20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 qrencode Desktop I5RHBG 【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错 iSulad iSulad I5SCLC 【20.03 SP3】selinux-policy卸载异常 selinux-policy sig-security-facility I5SS97 【openEuler-20.03-SP3】[arm/x86]trafficserver指定配置文件进行查看/扫描失败 trafficserver Networking openEuler-22.03-LTS Update 20220919 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞18个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ROW1?from=project-i…
CVE修复: CVE 仓库 CVSS评分 CVE-2017-3735 shim 5.3 CVE-2018-0732 shim 7.5 CVE-2020-1971 shim 5.9 CVE-2021-23840 shim 7.5 CVE-2021-3712 shim 7.4 CVE-2022-0778 shim 7.5 CVE-2022-29901 linux-sgx 9.8 CVE-2022-2520 libtiff 6.5 CVE-2022-26373 kernel 5.5 CVE-2022-2905 kernel 5.5 CVE-2022-2991 kernel 6.7 CVE-2022-3078 kernel 5.5 CVE-2022-40307 kernel 4.7 CVE-2022-27664 golang 7.5 CVE-2022-40674 expat 9.8 CVE-2022-36109 docker 6.3 CVE-2022-40320 libconfuse 8.8 CVE-2022-2735 pcs 7.8 Bugfix: issue 仓库 #I5RQKG:lws_service() triggered assert<
https://gitee.com/open_euler/dashboard?issue_id=I5RQKG
> libwebsockets #I5P7EI:【openEuler-22.09-RC3】【arm/x86】lxc 软件包 "-?" 参数执行返回"invalid option"<
https://gitee.com/open_euler/dashboard?issue_id=I5P7EI
> lxc #I5RQPC:删除daemon json中无用的字段<
https://gitee.com/open_euler/dashboard?issue_id=I5RQPC
> lcr #I5PEOK:【22.03_LTS_update0831】【arm/x86】iSulad包升级、降级过程存在错误信息<
https://gitee.com/open_euler/dashboard?issue_id=I5PEOK
> iSulad #I5QJZI:【openEuler-22.03-LTS】【arm/x86】passenger 软件包命令行执行报错<
https://gitee.com/open_euler/dashboard?issue_id=I5QJZI
> passenger #I5SEBM:update oec hardware version to 1.1.2-4<
https://gitee.com/open_euler/dashboard?issue_id=I5SEBM
> oec-hardware #I5DC4A:【OLK-5.10】内存扩展特性中添加指定内存页面换出、swapcache回收等功能<
https://gitee.com/open_euler/dashboard?issue_id=I5DC4A
> kernel #I5RUMQ:upgrade to jdk11.0.17-06<
https://gitee.com/open_euler/dashboard?issue_id=I5RUMQ
> openjdk-11 openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务标题 关联仓库 SIG firefox浏览器无法播放音频和视频 firefox Application 【openEuler 22.03-LTS】5.10内核执行ltp用例出现softlockup问题 kernel Kernel 【openEuler22.03】【arm】ltp执行proc01用例失败 kernel Kernel 升级iinstall-scripts包会导致系统启动异常 install-scripts sig-OS-Builder 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt libbluray build problem in openEuler:22.03:LTS libbluray Desktop libxshmfence build problem in openEuler:22.03:LTS libxshmfence Desktop yaffs2 build problem in openEuler:22.03:LTS yaffs2 sig-embedded [22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 kernel Kernel 【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 pkgship sig-EasyLife 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-2991 I5O6AA 0.37 6.7 risc-v-kernel sig-RISC-V CVE-2021-43767 I5O6QO 0.6 5.9 postgresql DB CVE-2022-38533 I5OCPG 1.15 5.5 mingw-binutils sig-compat-winapp CVE-2022-38533 I5OCPF 1.15 5.5 binutils Compiler CVE-2022-3170 I5QMYH 1.26 7.8 risc-v-kernel sig-RISC-V CVE-2022-2905 I5OCW4 1.42 5.5 risc-v-kernel sig-RISC-V CVE-2022-2840 I5RWZL 2.16 9.8 zephyr CVE-2022-39955 I5S5XG 3.2 9.8 mod_security_crs Base-service CVE-2022-39956 I5S5YT 3.22 9.8 mod_security_crs Base-service CVE-2022-3202 I5QWJO 3.28 7.1 risc-v-kernel sig-RISC-V CVE-2022-36033 I5OPAV 4.29 jsoup sig-Java CVE-2022-34169 I5HV9H 4.37 7.5 openjdk-1.8.0 Compiler CVE-2020-35536 I5OS1X 4.74 5.5 mingw-gcc sig-compat-winapp CVE-2020-35536 I5OV75 4.95 5.5 gcc Compiler CVE-2022-3061 I5OVRO 5.01 5.5 risc-v-kernel sig-RISC-V CVE-2022-38126 I5OWHY 5.3 5.5 mingw-binutils sig-compat-winapp CVE-2022-38126 I5OWHX 5.3 5.5 binutils Compiler CVE-2022-38128 I5OWIK 5.38 5.5 mingw-binutils sig-compat-winapp CVE-2022-38128 I5OWIJ 5.38 5.5 binutils Compiler CVE-2022-38127 I5OWII 5.38 5.5 mingw-binutils sig-compat-winapp CVE-2022-38127 I5OWIH 5.38 5.5 binutils Compiler CVE-2022-28321 I5SND3 5.39 9.8 pam sig-security-facility CVE-2022-1976 I5RGF6 5.83 7.8 risc-v-kernel sig-RISC-V CVE-2022-40150 I5RJ5B 6 7.5 jettison dev-utils CVE-2022-40149 I5RJ57 6 7.5 jettison dev-utils CVE-2022-3176 I5RJNX 6.16 7.8 risc-v-kernel sig-RISC-V CVE-2022-3176 I5RJNS 6.16 7.8 kernel Kernel CVE-2022-32087 I5RJTQ 6.22 7.5 mariadb DB CVE-2022-32091 I5RJTP 6.22 7.5 mariadb DB CVE-2022-32085 I5RJTO 6.22 7.5 mariadb DB CVE-2022-32084 I5RJTN 6.22 7.5 mariadb DB CVE-2022-32088 I5RJTM 6.22 7.5 mariadb DB CVE-2022-32083 I5RJTF 6.22 7.5 mariadb DB CVE-2022-35940 I5RJXA 6.41 7.5 tensorflow sig-ai CVE-2022-35935 I5RJX4 6.41 7.5 tensorflow sig-ai CVE-2022-35952 I5RJX0 6.41 7.5 tensorflow sig-ai CVE-2022-35963 I5RJWZ 6.41 7.5 tensorflow sig-ai CVE-2022-1841 I5P3I2 6.41 5.3 zephyr CVE-2022-35986 I5RJYX 6.54 7.5 tensorflow sig-ai CVE-2022-35985 I5RJYN 6.54 7.5 tensorflow sig-ai CVE-2022-35994 I5RJYJ 6.54 7.5 tensorflow sig-ai CVE-2022-35983 I5RJYE 6.54 7.5 tensorflow sig-ai CVE-2022-35970 I5RJYB 6.54 7.5 tensorflow sig-ai CVE-2022-35971 I5RJY8 6.54 7.5 tensorflow sig-ai CVE-2022-35989 I5RJY2 6.54 7.5 tensorflow sig-ai CVE-2022-35991 I5RJXY 6.54 7.5 tensorflow sig-ai CVE-2022-35984 I5RJXX 6.54 7.5 tensorflow sig-ai CVE-2022-35965 I5RJXV 6.54 7.5 tensorflow sig-ai CVE-2022-36014 I5RKJ5 6.63 7.5 tensorflow sig-ai CVE-2022-36000 I5RKIO 6.63 7.5 tensorflow sig-ai CVE-2022-36002 I5RKI5 6.63 7.5 tensorflow sig-ai CVE-2022-36018 I5RKHT 6.63 7.5 tensorflow sig-ai CVE-2022-36003 I5RKHE 6.63 7.5 tensorflow sig-ai CVE-2022-36026 I5RKGS 6.63 7.5 tensorflow sig-ai CVE-2022-36017 I5RKGF 6.63 7.5 tensorflow sig-ai CVE-2022-36013 I5RKG9 6.63 7.5 tensorflow sig-ai CVE-2022-36005 I5RKFV 6.63 7.5 tensorflow sig-ai CVE-2022-36019 I5RKFQ 6.63 7.5 tensorflow sig-ai CVE-2022-36011 I5RKFB 6.63 7.5 tensorflow sig-ai CVE-2022-36027 I5RKF9 6.63 7.5 tensorflow sig-ai CVE-2022-36001 I5RKF2 6.63 7.5 tensorflow sig-ai CVE-2022-36016 I5RKES 6.63 7.5 tensorflow sig-ai CVE-2022-36015 I5RKEN 6.63 7.5 tensorflow sig-ai CVE-2022-35990 I5RKNH 6.64 7.5 tensorflow sig-ai CVE-2022-35998 I5RKN6 6.64 7.5 tensorflow sig-ai CVE-2022-35979 I5RKMX 6.64 7.5 tensorflow sig-ai CVE-2022-35967 I5RKMV 6.64 7.5 tensorflow sig-ai CVE-2022-35941 I5RKMP 6.64 7.5 tensorflow sig-ai CVE-2022-35959 I5RKMG 6.64 7.5 tensorflow sig-ai CVE-2022-35964 I5RKME 6.64 7.5 tensorflow sig-ai CVE-2022-35934 I5RKM5 6.64 7.5 tensorflow sig-ai CVE-2022-35966 I5RKM0 6.64 7.5 tensorflow sig-ai CVE-2022-35992 I5RKLN 6.64 7.5 tensorflow sig-ai CVE-2022-35988 I5RKLI 6.64 7.5 tensorflow sig-ai CVE-2022-35973 I5RKL2 6.64 7.5 tensorflow sig-ai CVE-2022-35999 I5RKKW 6.64 7.5 tensorflow sig-ai CVE-2022-35993 I5RKKT 6.64 7.5 tensorflow sig-ai CVE-2022-35972 I5RKKF 6.64 7.5 tensorflow sig-ai CVE-2022-36012 I5RKJX 6.64 7.5 tensorflow sig-ai CVE-2022-36004 I5RKJF 6.64 7.5 tensorflow sig-ai CVE-2022-35968 I5RKQP 6.65 7.5 tensorflow sig-ai CVE-2022-35960 I5RKQJ 6.65 7.5 tensorflow sig-ai CVE-2022-35995 I5RKPU 6.65 7.5 tensorflow sig-ai CVE-2022-35996 I5RKPE 6.65 7.5 tensorflow sig-ai CVE-2022-35981 I5RKP6 6.65 7.5 tensorflow sig-ai CVE-2022-35974 I5RKO5 6.65 7.5 tensorflow sig-ai CVE-2022-35969 I5RKO1 6.65 7.5 tensorflow sig-ai CVE-2022-35982 I5RKNU 6.65 7.5 tensorflow sig-ai CVE-2022-35987 I5RKNR 6.65 7.5 tensorflow sig-ai CVE-2022-35997 I5RKNK 6.65 7.5 tensorflow sig-ai CVE-2021-3714 I5RLWB 6.84 7.5 kernel Kernel CVE-2022-30550 I5RM9Q 6.91 8.8 dovecot Application CVE-2022-3077 I5PAV0 7.15 5.5 risc-v-kernel sig-RISC-V CVE-2020-27784 I5PB1F 7.36 5.5 risc-v-kernel sig-RISC-V CVE-2022-39190 I5PEDX 7.81 5.5 risc-v-kernel sig-RISC-V CVE-2022-39188 I5PEA3 7.81 4.7 risc-v-kernel sig-RISC-V CVE-2022-39188 I5PE9S 7.81 4.7 kernel Kernel CVE-2022-2226 I5PJ3N 8.64 thunderbird sig-desktop-apps CVE-2022-1798 I5PJ3L 8.64 6.5 kubevirt sig-CloudNative CVE-2021-25215 I5RQRE 8.65 7.5 dhcp Networking CVE-2022-36059 I5PJ90 8.67 thunderbird sig-desktop-apps CVE-2022-3034 I5PJ8X 8.67 thunderbird sig-desktop-apps CVE-2022-3033 I5PJ8V 8.67 thunderbird sig-desktop-apps CVE-2022-3032 I5PJ8P 8.67 thunderbird sig-desktop-apps CVE-2021-25220 I5RRPB 8.7 8.6 dhcp Networking CVE-2022-40023 I5RTRP 8.85 7.5 python-mako Base-service CVE-2022-32912 I5RX0A 9.17 8.8 webkit2gtk3 Desktop CVE-2022-32886 I5RX09 9.17 8.8 webkit2gtk3 Desktop CVE-2022-3239 I5RX5Z 9.28 7.8 risc-v-kernel sig-RISC-V CVE-2022-3239 I5RX5X 9.28 7.8 kernel Kernel CVE-2022-34917 I5RZUH 9.68 7.5 kafka sig-bigdata CVE-2022-39958 I5S5Y1 10.21 7.5 mod_security_crs Base-service CVE-2022-39957 I5S5ZB 10.22 7.5 mod_security_crs Base-service CVE-2018-3615 I5PRU5 10.9 microcode_ctl System-tool CVE-2022-2795 I5SEM1 11.16 7.5 bind Networking CVE-2022-38178 I5SELZ 11.16 7.5 bind Networking CVE-2022-38177 I5SELX 11.16 7.5 bind Networking CVE-2022-3080 I5SELJ 11.16 7.5 bind Networking CVE-2022-2906 I5SGK9 11.64 7.5 bind Networking CVE-2022-2881 I5SGJ9 11.64 8.2 bind Networking CVE-2022-38928 I5SMOS 12.04 7.8 poppler Desktop CVE-2022-3256 I5SN6M 12.16 7.8 vim Base-service CVE-2022-1292 I5QBRK 13.81 6.7 linux-sgx sig-confidential-computing CVE-2022-40307 I5QI0Z 14.79 4.7 risc-v-kernel sig-RISC-V CVE-2022-40307 I5QI0W 14.79 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 车明道(openEuler release SIG) Mobile: +86 15345431107 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com> [cid:image003.png@01D8D038.61EF7A60]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
4款MindSpore依赖软件申请入openEuler22.03 LTS update版本,测试报告请社区审核
by wangsiyuan
23 Sep '22
23 Sep '22
背景: MindSpore后续希望能够兼容openEuler社区生态,当前openEuler中缺少opencv、opencl-clhpp、oneDNN、sentencepiece 4款依赖软件的软件包,申请集成到22.03 LTS中, 申请议题已在release sig 9/23例会评审,遗留一个问题,要求测试报告在社区发起评审。 测试报告PR地址: opencv
https://gitee.com/openeuler/QA/pulls/276
opencl-clhpp
https://gitee.com/openeuler/QA/pulls/275
oneDNN
https://gitee.com/openeuler/QA/pulls/277
sentencepiece
https://gitee.com/openeuler/QA/pulls/274
1
0
0
0
← Newer
1
...
29
30
31
32
33
34
35
...
54
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Results per page:
10
25
50
100
200