mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
List overview
Download
Release
----- 2024 -----
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
release@openeuler.org
6 participants
711 discussions
Start a n
N
ew thread
openEuler update_20230329版本发布公告
by muyuying
01 Apr '23
01 Apr '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230329发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230329发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供 update_ 20230405 版本。 openEuler-20.03-LTS-SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41725 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41723 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27538 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27535 curl 5.8 CVE-2023-27534 curl 4.5 CVE-2023-27533 curl 4.5 CVE-2023-26769 liblouis 7.5 CVE-2022-36021 redis 5.5 CVE-2023-28466 kernel 7 CVE-2023-1382 kernel 0 CVE-2023-1281 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2022-4269 kernel 5.5 CVE-2022-29901 kernel 5.6 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-29901 kernel 5.6 CVE-2022-4269 kernel 5.5 CVE-2023-1079 kernel 6.8 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6KMOJ:grub2支持tpcm3.0特性 grub2 #I6L25L:shim支持可信计算3.0tpcm特性 shim #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-48423 kernel 7.8 CVE-2022-48424 kernel 7.8 CVE-2022-48425 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2023-1249 kernel 4.1 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-22999 kernel 5.5 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6MTKW:【grub2】grub2-rpm-sort命令执行报错 grub2 #I6RDEF:update20230329 添加sw架构 perftest #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6RE2O:update20230329 [Update] Update to v0.4.1 pin-gcc-client #I64VTB:执行命令报错error -4 papi #I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2 procps-ng #I6GCRA:部署好server,client,插入ko,虚拟机重启 dpu-utilities #I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率 st,st占用率一直显示为0 procps-ng #I6RE77:update20230329 update syscare to 1.0.1 syscare #I67PXN:fix changelog date error rsyslog #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-25664 I6Q9HZ 0.17 9.8 tensorflow sig-ai CVE-2023-27586 I6OW3B 3.0 7.1 python-cairosvg CVE-2023-0386 I6PBWH 4.17 7.8 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1194 I6KDP0 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWP 4.38 0.0 risc-v-kernel sig-RISC-V CVE-2023-0464 I6PDB8 4.42 7.5 openssl sig-security-facility CVE-2023-1249 I6KT9F 5.26 5.5 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 5.26 5.5 kernel Kernel CVE-2023-28772 I6PRCO 5.75 7.8 kernel Kernel CVE-2023-1108 I6KVMO 5.76 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 5.8 6.5 libmemcached Programming-language CVE-2023-25669 I6Q38F 6.67 7.5 tensorflow sig-ai CVE-2023-25670 I6Q38E 6.67 7.5 tensorflow sig-ai CVE-2023-25659 I6Q37O 6.67 7.5 tensorflow sig-ai CVE-2023-25658 I6Q37N 6.67 7.5 tensorflow sig-ai CVE-2023-25673 I6Q9HC 7.16 7.5 tensorflow sig-ai CVE-2023-25671 I6Q9HA 7.16 7.5 tensorflow sig-ai CVE-2023-25665 I6Q9H7 7.16 7.5 tensorflow sig-ai CVE-2023-27579 I6Q9G1 7.16 7.5 tensorflow sig-ai CVE-2023-25663 I6Q9IB 7.17 7.5 tensorflow sig-ai CVE-2023-25666 I6Q9I8 7.17 7.5 tensorflow sig-ai CVE-2023-25667 I6Q9I6 7.17 7.5 tensorflow sig-ai CVE-2023-25660 I6Q9I4 7.17 7.5 tensorflow sig-ai CVE-2023-25674 I6Q9HW 7.17 7.5 tensorflow sig-ai CVE-2023-25662 I6Q9HP 7.17 7.5 tensorflow sig-ai CVE-2023-25672 I6Q9HK 7.17 7.5 tensorflow sig-ai CVE-2023-1289 I6LKHN 7.38 5.5 ImageMagick Others CVE-2011-5034 I6LPRE 7.96 0.0 geronimo-saaj sig-Java CVE-2023-1436 I6P70O 11.35 7.5 jettison dev-utils CVE-2023-1370 I6MX6A 11.35 7.5 json-smart sig-Java CVE-2023-1032 I6MSIY 11.63 0.0 kernel Kernel CVE-2023-28176 I6N797 12.77 0.0 firefox Application CVE-2023-28159 I6N78R 12.77 0.0 firefox Application CVE-2023-1390 I6N7CV 12.78 6.5 risc-v-kernel sig-RISC-V CVE-2023-28164 I6N87J 12.8 6.1 firefox Application CVE-2023-28162 I6N860 12.8 0.0 firefox Application CVE-2023-28177 I6N8JV 12.81 0.0 firefox Application CVE-2023-28163 I6N8EY 12.81 0.0 firefox Application CVE-2023-28161 I6N8CG 12.81 0.0 firefox Application CVE-2023-28160 I6N89T 12.81 0.0 firefox Application CVE-2023-25752 I6N96P 12.83 6.1 firefox Application CVE-2023-25750 I6N96C 12.83 0.0 firefox Application CVE-2023-25748 I6N965 12.83 0.0 firefox Application CVE-2023-25749 I6N960 12.83 0.0 firefox Application CVE-2023-25751 I6N97Z 12.84 0.0 firefox Application CVE-2023-28328 I6NCQH 13.0 0.0 kernel Kernel CVE-2023-28327 I6NCP2 13.0 0.0 kernel Kernel CVE-2023-1380 I6NCVX 13.01 0.0 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler release sig例会
by openEuler conference
30 Mar '23
30 Mar '23
您好! sig-release-management SIG 邀请您参加 2023-03-31 10:00 召开的Zoom会议(自动录制) 会议主题:openEuler release sig例会 会议内容: 1. openEuler 23.03创新版本release发布评审 2. openEuler 22.03 LTS SP2版本计划讨论 3. openEuler update维护版本情况例行汇报 其它 会议链接:https://us06web.zoom.us/j/83836682556?pwd=YmFKcGdNOVUwWTRlNFo0Q1VnR3ZYQT09
会议纪要:https://etherpad.openeuler.org/p/sig-release-management-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-release-management SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-31 10:00, The subject of the conference is openEuler release sig例会, Summary: 1. openEuler 23.03创新版本release发布评审 2. openEuler 22.03 LTS SP2版本计划讨论 3. openEuler update维护版本情况例行汇报 其它 You can join the meeting at
https://us06web.zoom.us/j/83836682556?pwd=YmFKcGdNOVUwWTRlNFo0Q1VnR3ZYQT09
. Add topics at
https://etherpad.openeuler.org/p/sig-release-management-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler 23.03 RC5版本release公告
by Wangwei (Bessel)
29 Mar '23
29 Mar '23
Dear all, openEuler 23.03 RC5版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC5版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件,版本严重/主要问题基本闭环(经决策后的少量遗留问题见附件1),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/31)将会在release-management-sig例会进行版本发布评审。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC5版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc5_openeuler-2023-03-2…
openEuler 23.03 RC5版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC5版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
附件1: 版本遗留问题清单 任务标题 根因分析 影响分析 标签 任务路径 [23.03RC1][arm/x86] ipa-epn.service服务启动失败 执行ipa-client-install时,需要连接到 FreeIPA 服务器。ipa服务器配置需要安装ipa-server相关包,目前查到的结果是必须要ipa-server相关包才行;未引入ipa-server包 影响大小:小 影响功能:当前没有相关使用场景,通过ipa-client-install命令配置时,需要连接到 FreeIPA 服务器。ipa服务器配置需要安装ipa-server相关包,当前社区未引入,后续引入后重新配置。 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6I1F7
[23.03RC1][arm/x86]mom-vdsm.service服务启动失败 添加ovirt主机需要 postgresql-jdbc软件包版本为42.2.4,当前社区版本为42.4.1,建议issue遗留 影响大小:小 影响功能:无法添加ovirt主机,需要需要通过此文档方式部署
https://www.kdocs.cn/l/cmzyU7dYxwSr
sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IGXA
[23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IJ1A
[23.03RC1][arm/x86] nmcli配置MACsec失败 做了测试可以确认这个issue和wpa_supplicant和openssl无关,具体原因还需要时间查找。初步判断是kernel里面的macsec设备配合方面有问题,无法grab 影响小,wifi状态下的媒体访问控制安全(MACsec)无法使用,其他功能都正常 sig/Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6INQT
【openEuler-23.03】【arm】syzkaller服务报Driver 'virtio_gpudrmfb' missed to adjust virtual screen size等错误 6.1内核版本不做模糊测试 无 sig/Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6IZEN
[23.03RC2][arm/x86]driver-installer.service服务enable后启动,日志有报错 目前的存在的其他问题为程序在用户点击时会调用执行脚本,脚本路径在程序中多个地方硬编码为 /usr/lib/deepin-graphics-driver-manager 目录下,而目前的脚本打包路径为 /usr/lib64 已修复,影响小,暂无独立显卡的机器进行验证,且该软件只是用来管理显卡的,不影响其他功能使用。在推动统信验证中 sig/sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I6KP18
缺失perf-debuginfo包 23.03创新版本的6.1内核后续不会长期演进,考虑没有必要提供debuginfo包 影响小,perf调试若有诉求,用户可自行编译perf-debuginfo sig/Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6LKXG
【23.03】Fastdb应用make -j64编译卡死 经调试,关闭插件pass的内容,仅启用通信子系统的功能。在lto场景下,会出现make -j卡死的情况。 经过分析,判断是多进程场景下没有正常释放client的资源 影响小,make -j1的情况下是能够正常使能插件框架的功能。添加make -j多进程编译的限制条件后,不会对插件框架的使用、以及其他任何项目产生影响。 sig/Compiler
https://gitee.com/src-openeuler/pin-gcc-client/issues/I6QWQY
附件2: release-plan [cid:image001.jpg@01D9626F.0D507990] BR 王伟(openEuler release SIG)
1
0
0
0
openEuler update_20230322版本发布公告
by muyuying
26 Mar '23
26 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230322发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230322发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/02)提供 update_ 20230329 版本。 openEuler-20.03-LTS-SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCM?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞5个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCO?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞2个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCP?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6DM2X:兼容-accel参数 stratovirt #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I5YM6P:openEuler 22.03 LTS Next版本python-chardet软件升级至5.0.0 python-chardet #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask<
https://gitee.com/open_euler/dashboard?issue_id=I6NVPT
> kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞5个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCL?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 CVE-2023-1074 kernel 4.7 CVE-2023-1079 kernel 6.8 CVE-2023-1382 kernel 0 Bugfix: issue 仓库 #I6P9BJ:update20230322-update iputils to version 20221126 iputils #I6DM2X:兼容-accel参数 stratovirt #I6ORHV:【22.03_LTS_SP1】jemalloc版本需要从5.2.1升级到5.3.0 jemalloc #I6NY9Y:22.03-openEuler-LTS-SP1升级zbar,通过升级合入上游社区修复的一系列问题 zbar #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-48423 I6OD4U 1.61 9.8 kernel Kernel CVE-2021-3329 I6HUIN 3.0 6.5 zephyr CVE-2023-1076 I6I7UH 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U8 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-20860 I6PDX0 4.6 9.1 springframework sig-Java CVE-2023-28466 I6NIUR 4.61 7.0 kernel Kernel CVE-2023-28466 I6NIUL 4.61 7.0 risc-v-kernel sig-RISC-V CVE-2023-27781 I6NIU2 4.61 7.8 jpegoptim Application CVE-2023-1095 I6IK9V 5.25 5.5 risc-v-kernel sig-RISC-V CVE-2023-1018 I6IKCI 5.5 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 5.52 5.9 firefox Application CVE-2023-22997 I6IKXC 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 5.6 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 5.6 5.5 kernel Kernel CVE-2023-22998 I6IKWF 5.6 5.5 kernel Kernel CVE-2023-22999 I6IKXV 5.61 5.5 risc-v-kernel sig-RISC-V CVE-2023-25155 I6IRPL 5.87 6.5 redis Others CVE-2023-25155 I6IRP9 5.87 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 5.87 6.5 redis5 sig-bigdata CVE-2022-36021 I6IRS4 5.88 5.5 redis Others CVE-2022-36021 I6IRRY 5.88 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 5.88 5.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 5.92 0.0 edk2 Virt CVE-2019-14561 I6ISWY 5.92 0.0 edk2 Virt CVE-2023-22462 I6ITUB 5.95 5.4 grafana Application CVE-2023-27594 I6O472 6.19 7.3 cilium sig-high-performance-network CVE-2023-0594 I6IVYK 6.25 5.4 grafana Application CVE-2023-0507 I6IVYI 6.25 5.4 grafana Application CVE-2023-23004 I6IXRY 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 6.65 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 6.65 5.5 kernel Kernel CVE-2023-23002 I6IXOH 6.65 5.5 kernel Kernel CVE-2023-23005 I6IXO8 6.65 5.5 kernel Kernel CVE-2023-23001 I6IXNW 6.65 5.5 kernel Kernel CVE-2023-1161 I6JJJE 8.25 6.5 wireshark Application CVE-2022-48425 I6OD5R 8.61 7.8 kernel Kernel CVE-2022-48424 I6OD4P 8.61 7.8 kernel Kernel CVE-2023-1281 I6OP9S 9.51 7.8 kernel Kernel CVE-2023-27586 I6OW3B 9.87 7.1 python-cairosvg CVE-2022-41725 I6OXZH 9.93 7.5 golang sig-golang CVE-2022-41724 I6OXZB 9.93 7.5 golang sig-golang CVE-2022-41723 I6OXYJ 9.93 7.5 golang sig-golang CVE-2019-10358 I6K7LN 10.87 6.5 maven2 sig-Java CVE-2017-1000397 I6K7IR 10.87 5.9 maven2 sig-Java CVE-2023-1194 I6KDP0 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 11.13 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDP1 11.13 0.0 kernel Kernel CVE-2023-1193 I6KEWP 11.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWO 11.25 6.5 kernel Kernel CVE-2023-1249 I6KT9F 12.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 12.12 4.1 kernel Kernel CVE-2023-1252 I6KTT3 12.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1108 I6KVMO 12.63 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 12.66 6.5 libmemcached Programming-language CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler 23.03 RC4版本release公告
by Wangwei (Bessel)
23 Mar '23
23 Mar '23
Dear all, openEuler 23.03 RC4版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC4版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件,版本严重/主要问题基本闭环(经决策后的少量遗留严重/主要问题见附件1,需要在RC4阶段社区协作重点解决),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/27)将会提供 RC5 版本。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC4版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc4_openeuler-2023-03-2…
openEuler 23.03 RC4版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC4版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
附件1: 当前遗留问题清单 ,请对应owner在27日前解决,若不解决请在release-management sig会议讨论是否可以移除;RC5前未解决问题,按照社区原则将不带入openEuler 23.03版本 任务ID 任务标题 任务状态 标签 任务路径 I6GCHU 【EBS】 tensorflow build problem in openEuler:23.03 待办的 sig/ai
https://gitee.com/open_euler/dashboard?issue_id=I6GCHU
I6INQT [23.03RC1][arm/x86] nmcli配置MACsec失败 已确认 sig/Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6INQT
I6OWBC [23.03]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 待办的 sig/Desktop
https://gitee.com/open_euler/dashboard?issue_id=I6OWBC
I6OM4Z isula load大镜像失败 待办的 sig/iSulad
https://gitee.com/open_euler/dashboard?issue_id=I6OM4Z
I6IJ1A [23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败 待办的 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IJ1A
I6LFW1 【EBS】libkae build problem in openEuler:23.03 待办的 sig/sig-AccLib
https://gitee.com/open_euler/dashboard?issue_id=I6LFW1
I6HNR7 【EBS】caja-extensions build problem in openEuler:23.03:Epol 待办的 sig/sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I6HNR7
I6IV5K 【OBS&EBS】system-config-users-docs build problem in openEuler:23.03:Epol 修复中 sig/sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I6IV5K
I6KIWU [23.03RC2][arm/x86]biometric-authentication.service服务启动失败 修复中 sig/sig-UKUI
https://gitee.com/open_euler/dashboard?issue_id=I6KIWU
I6HK2K 【EBS】tcmu-runner build problem in openEuler:23.03:Epol 待办的 sig/Storage
https://gitee.com/open_euler/dashboard?issue_id=I6HK2K
附件2: release-plan [cid:image003.jpg@01D95DA1.EB885AC0] BR 王伟(openEuler release SIG)
1
0
0
0
Release SIG 例会
by openEuler conference
22 Mar '23
22 Mar '23
您好! sig-release-management SIG 邀请您参加 2023-03-24 10:00 召开的Zoom会议(自动录制) 会议主题:Release SIG 例会 会议内容: 1、openEuler 23.03 创新版本进展 2、openEuler 22.03 LTS SP2 release plan 讨论 3、update维护版本例行汇报 4、其他议题欢迎申报 会议链接:https://us06web.zoom.us/j/85939057497?pwd=MmNHQUhMYkxTVzhZY3I0cnQrZWtXZz09
会议纪要:https://etherpad.openeuler.org/p/sig-release-management-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-release-management SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-24 10:00, The subject of the conference is Release SIG 例会, Summary: 1、openEuler 23.03 创新版本进展 2、openEuler 22.03 LTS SP2 release plan 讨论 3、update维护版本例行汇报 4、其他议题欢迎申报 You can join the meeting at
https://us06web.zoom.us/j/85939057497?pwd=MmNHQUhMYkxTVzhZY3I0cnQrZWtXZz09
. Add topics at
https://etherpad.openeuler.org/p/sig-release-management-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
2
1
0
0
openEuler update_20230315版本发布公告
by muyuying
19 Mar '23
19 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。 openEuler-20.03-LTS-SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-40899 future 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-27320 sudo 1 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-38751 snakeyaml 6.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本 python-paramiko #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-26081 epiphany 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-27320 sudo 1 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-3560 pesign 5.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-26607 kernel 7.1 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-1175 vim 7.3 CVE-2023-1170 vim 7.8 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-40899 future 7.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6J86M:repo python-lit-15.0.7-1源码包 python-lit #I6K0AO:gala-gopher升级到1.0.2版本 gala-gopher #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6MR9A:例行回合社区补丁 efibootmgr #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxx #I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxxabi #I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 llvm-libunwind openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.19日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-0662 I6FWA8 0.13 5.3 php Base-service CVE-2023-0567 I6FXSZ 0.2 6.2 php Base-service CVE-2019-17003 I6FZ58 0.45 6.1 thunderbird sig-desktop-apps CVE-2023-23039 I6H8H5 6.02 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 6.02 5.5 freeimage dev-utils CVE-2023-26464 I6MI3U 7.87 7.5 log4j12 Application CVE-2021-3329 I6HUIN 9.2 6.5 zephyr CVE-2023-1055 I6I76Q 10.33 5.5 three-eight-nine-ds-base Application CVE-2023-1076 I6I7UH 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7U9 10.58 6.8 kernel Kernel CVE-2023-1075 I6I7U8 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U2 10.58 2.5 kernel Kernel CVE-2023-24533 I6LIQ9 10.8 7.5 golang sig-golang CVE-2023-27781 I6NIU2 10.81 7.8 jpegoptim Application CVE-2023-1073 I6IFV4 11.12 6.3 kernel Kernel CVE-2023-1095 I6IK9V 11.45 5.5 risc-v-kernel sig-RISC-V CVE-2023-1095 I6IK9U 11.45 5.5 kernel Kernel CVE-2023-1018 I6IKCI 11.7 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 11.72 5.9 firefox Application CVE-2023-22999 I6IKXV 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKXC 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 11.81 5.5 kernel Kernel CVE-2023-22998 I6IKWF 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWB 11.81 5.5 kernel Kernel CVE-2022-36021 I6IRS4 12.08 5.5 redis Others CVE-2022-36021 I6IRRY 12.08 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 12.08 5.5 redis5 sig-bigdata CVE-2023-25155 I6IRPL 12.08 6.5 redis Others CVE-2023-25155 I6IRP9 12.08 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 12.08 6.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 12.12 0.0 edk2 Virt CVE-2019-14561 I6ISWY 12.12 0.0 edk2 Virt CVE-2023-22462 I6ITUB 12.16 5.4 grafana Application CVE-2023-0594 I6IVYK 12.45 5.4 grafana Application CVE-2023-0507 I6IVYI 12.45 5.4 grafana Application CVE-2023-23004 I6IXRY 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 12.85 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 12.85 5.5 kernel Kernel CVE-2023-23002 I6IXOH 12.85 5.5 kernel Kernel CVE-2023-23005 I6IXO8 12.85 5.5 kernel Kernel CVE-2023-23001 I6IXNW 12.85 5.5 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel CVE-2023-1161 I6JJJE 14.45 6.5 wireshark Application openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler23.03版本未关闭issue协助
by Wangwei (Bessel)
14 Mar '23
14 Mar '23
任务ID 任务标题 标签 任务路径 I6IO8T 【23.03_RC1】【x86/arm】opencv存在不安全的编译选项RPATH、STRIP sig/ai
https://gitee.com/open_euler/dashboard?issue_id=I6IO8T
I6IOBP 【23.03_RC1】【x86/arm】bazel存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOBP
I6IOJ5 【23.03_RC1】【x86/arm】sentencepiece不存在安全的编译选项PIE、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOJ5
I6GCHU 【EBS】 tensorflow build problem in openEuler:23.03
https://gitee.com/open_euler/dashboard?issue_id=I6GCHU
I6INQT [23.03RC1][arm/x86] nmcli配置MACsec失败 sig/Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6INQT
I6IOCH 【23.03_RC1】【x86/arm】flink存在不安全的编译选项STRIP sig/bigdata
https://gitee.com/open_euler/dashboard?issue_id=I6IOCH
I6IOCK 【23.03_RC1】【x86/arm】flume存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOCK
I6IOCQ 【23.03_RC1】【x86/arm】hadoop-3.1存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOCQ
I6IOCW 【23.03_RC1】【x86/arm】kafka存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOCW
I6IOD8 【23.03_RC1】【x86/arm】oozie存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOD8
I6IODN 【23.03_RC1】【x86/arm】spark存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODN
I6IODO 【23.03_RC1】【x86/arm】storm存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODO
I6IODV 【23.03_RC1】【x86/arm】zookeeper存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODV
I6LPPM 【EBS】hive 安装失败在openEuler:23.03
https://gitee.com/open_euler/dashboard?issue_id=I6LPPM
I6IOAR 【23.03_RC1】【x86/arm】gvfs存在不安全的编译选项RPATH、 sig/Desktop
https://gitee.com/open_euler/dashboard?issue_id=I6IOAR
I6IOCM 【23.03_RC1】【x86/arm】gio-qt存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOCM
I6IOCO 【23.03_RC1】【x86/arm】guile存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOCO
I6IODP 【23.03_RC1】【x86/arm】sunpinyin存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODP
I6IODU 【23.03_RC1】【x86/arm】webkit2gtk3存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODU
I6IOJD 【23.03_RC1】【x86/arm】blur-effect存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOJD
I6IOAH 【23.03_RC1】【x86/arm】dleyna-renderer存在不安全的编译选项RPATH、 sig/GNOME
https://gitee.com/open_euler/dashboard?issue_id=I6IOAH
I6IOAI 【23.03_RC1】【x86/arm】eog存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAI
I6IOAN 【23.03_RC1】【x86/arm】gedit存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAN
I6IOAO 【23.03_RC1】【x86/arm】gnome-connections存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAO
I6IOD5 【23.03_RC1】【x86/arm】mozjs102存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOD5
I6IOJ7 【23.03_RC1】【x86/arm】mutter存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOJ7
I6IOJ8 【23.03_RC1】【x86/arm】vala存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOJ8
I6IOJE 【23.03_RC1】【x86/arm】gnome-tour存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOJE
I6IOAF 【23.03_RC1】【x86/arm】collectd存在不安全的编译选项RPATH、 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IOAF
I6IODC 【23.03_RC1】【x86/arm】ovirt-engine-wildfly存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODC
I6IGXA [23.03RC1][arm/x86]mom-vdsm.service服务启动失败
https://gitee.com/open_euler/dashboard?issue_id=I6IGXA
I6IGZU [23.03RC1] [x86/arm] momd.service服务启动失败
https://gitee.com/open_euler/dashboard?issue_id=I6IGZU
I6IJ1A [23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败
https://gitee.com/open_euler/dashboard?issue_id=I6IJ1A
I6IOB1 【23.03_RC1】【x86/arm】ncbi-blast存在不安全的编译选项RPATH、 sig/sig-bio
https://gitee.com/open_euler/dashboard?issue_id=I6IOB1
I6IOAE 【23.03_RC1】【x86/arm】cinnamon-settings-daemon存在不安全的编译选项RPATH、 sig/sig-cinnamon
https://gitee.com/open_euler/dashboard?issue_id=I6IOAE
I6IOAY 【23.03_RC1】【x86/arm】muffin存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAY
I6KZHF 【openEuler 23.03 round1】输入法无法切换,不能输入中文 sig/sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I6KZHF
I6IO8D 【23.03_RC1】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IO8D
I6IO94 【23.03_RC1】【x86/arm】startdde不存在安全的编译选项PIE、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IO94
I6IO9E 【23.03_RC1】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、
https://gitee.com/open_euler/dashboard?issue_id=I6IO9E
I6IOAG 【23.03_RC1】【x86/arm】deepin-compressor存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAG
I6IOJC 【23.03_RC1】【x86/arm】accel-config存在不安全的编译选项STRIP sig/sig-Intel-Arch
https://gitee.com/open_euler/dashboard?issue_id=I6IOJC
I6IO8M 【23.03_RC1】【x86/arm】ignition存在不安全的编译选项PIE、STRIP sig/sig-K8sDistro
https://gitee.com/open_euler/dashboard?issue_id=I6IO8M
I6IOJ3 【23.03_RC1】【x86/arm】kubekey不存在安全的编译选项PIE、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IOJ3
I6HNR7 【EBS】caja-extensions build problem in openEuler:23.03:Epol sig/sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I6HNR7
I6IV4L 【OBS&EBS】system-config-users build problem in openEuler:23.03:Epol
https://gitee.com/open_euler/dashboard?issue_id=I6IV4L
I6IV5K 【OBS&EBS】system-config-users-docs build problem in openEuler:23.03:Epol
https://gitee.com/open_euler/dashboard?issue_id=I6IV5K
I6GDCI 【EBS】python-nbxmpp在openEuler:23.03工程安装失败问题
https://gitee.com/open_euler/dashboard?issue_id=I6GDCI
I6J22D 【EBS】glade3 build problem in openEuler:23.03:Epol
https://gitee.com/open_euler/dashboard?issue_id=I6J22D
I6IOAB 【23.03_RC1】【x86/arm】caja-actions存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOAB
I6IO8U 【23.03_RC1】【x86/arm】openresty存在不安全的编译选项RPATH、STRIP sig/sig-OpenResty
https://gitee.com/open_euler/dashboard?issue_id=I6IO8U
I6IO8W 【23.03_RC1】【x86/arm】openresty-openssl111存在不安全的编译选项PIE、RPATH、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IO8W
I6IO8X 【23.03_RC1】【x86/arm】openresty-valgrind存在不安全的编译选项RPATH、STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IO8X
I6IOA3 【23.03_RC1】【x86/arm】raspberrypi-firmware存在不安全的编译选项PIE、 sig/sig-RaspberryPi
https://gitee.com/open_euler/dashboard?issue_id=I6IOA3
I6IODH 【23.03_RC1】【x86/arm】raspberrypi-userland存在不安全的编译选项STRIP
https://gitee.com/open_euler/dashboard?issue_id=I6IODH
I6IODD 【23.03_RC1】【x86/arm】poco存在不安全的编译选项STRIP sig/sig-ROS
https://gitee.com/open_euler/dashboard?issue_id=I6IODD
I6KIWU [23.03RC2][arm/x86]biometric-authentication.service服务启动失败 sig/sig-UKUI
https://gitee.com/open_euler/dashboard?issue_id=I6KIWU
I6IOBC 【23.03_RC1】【x86/arm】ukwm存在不安全的编译选项RPATH、
https://gitee.com/open_euler/dashboard?issue_id=I6IOBC
I6IJ0T 【23.03 round1】【arm/x86】claws-mail-plugins-tnef安装时缺少libytnef.so.0
https://gitee.com/open_euler/dashboard?issue_id=I6IJ0T
I6IOJ9 【23.03_RC1】【x86/arm】xfce4-sensors-plugin存在不安全的编译选项RPATH、 sig/xfce
https://gitee.com/open_euler/dashboard?issue_id=I6IOJ9
1
0
0
0
openEuler 23.03 RC3版本release公告
by Wangwei (Bessel)
13 Mar '23
13 Mar '23
Dear all, openEuler 23.03 RC3版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC3版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件,版本严重/主要问题基本闭环(经决策后的少量遗留严重/主要问题见附件1,需要在RC3阶段社区协作重点解决),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/15)将会提供 RC4 版本。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC3版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc3_openeuler-2023-03-1…
openEuler 23.03 RC3版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC3版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
版本目前还存在较多未关闭的issue,期望开发者共同努力,一起完成openEuler 23.03版本的发布 附件1: 当前遗留严重/主要问题清单 ,期望在RC4前闭环 里程碑 任务ID 任务标题 标签 openEuler-23.03-alpha I6GCHU 【EBS】 tensorflow build problem in openEuler:23.03 sig/ai openEuler-23.03-round-1 I6INQT [23.03RC1][arm/x86] nmcli配置MACsec失败 sig/Base-service openEuler-23.03-round-2 I6L4W5 设置cloud-init开机自启,执行reboot重启机器后发现ssh服务挂掉 sig/Base-service openEuler-23.03-round-2 I6LN6F [openEuler-23.03] elfutils 安装包缺少libasm-0.185.so libelf-0.185.so 等 文件 sig/Base-service openEuler-23.03-round-2 I6LBNR 反复重启kdump.service出现warning异常日志 sig/Base-service openEuler-23.03-round-2 I6MAU1 rsyslog DefaultNetstreamDriverCertFile超长报错信息变更 sig/Base-service openEuler-23.03-round-2 I6MAX1 确认新增文件/etc/pki/rpm-gpg/RPM-GPG-KEY-generic符合预期 sig/Base-service openEuler-23.03-round-2 I6LPPM 【EBS】hive 安装失败在openEuler:23.03 sig/bigdata openEuler-23.03-round-3 I6MP6K 【23.03 RC3】【arm/x86】Vector Type无法识别 sig/Compiler openEuler-23.03-round-2 I6LI97 23.03 pulseaudio 启动有错误提示且运行几秒后自动关闭 sig/Computing openEuler-23.03-round-2 I6LIXH memhog命令部分参数执行失败 sig/Computing openEuler-23.03-round-2 I6L1HM 使用RO分离功能,pull、load、rmi镜像。悬浮镜像,layers软连接未删除 sig/iSulad openEuler-23.03-round-2 I6MQ89 RO分离功能缺少RoLayerRefresh线程日志输出 sig/iSulad openEuler-23.03-round-2 I6MQLF isula rmi 删除镜像,graph目录overlay-layers文件夹下有layers残留 sig/iSulad openEuler-23.03-round-2 I6KODY 内核bonding模块:结合ipvlan,配置l3s模式报错 sig/Kernel openEuler-23.03-round-2 I6LMPN 【内核】启动项选择rescue,启动过程卡死 sig/Kernel openEuler-23.03-round-2 I6LSPZ 【grub2】grub2-rpm-sort命令执行报错 sig/Kernel openEuler-23.03-round-2 I6M7S1 加载IPVLAN模块后,无IPVLAN的性能参数:net.ipvlan.loop_delay/grep net.ipvlan.loop_qlen sig/Kernel openEuler-23.03-round-2 I6M9KG oe 2303环境systemd-nspawn服务启动失败 sig/Kernel openEuler-23.03-round-2 I6MAKV ipv6 DNAT组网不通 sig/Kernel openEuler-23.03-round-2 I6LTVN [openEuler-23.03] sftp是否可以访问上级目录/temp 失败后回显信息异常 sig/Networking openEuler-23.03-round-2 I6M9RC ntp-keygen -I没有iff密钥生成 sig/Networking openEuler-23.03-round-2 I6MB0T iptables命令执行Core掉 sig/Networking openEuler-23.03-round-1 I6IGXA [23.03RC1][arm/x86]mom-vdsm.service服务启动失败 sig/oVirt openEuler-23.03-round-1 I6IGZU [23.03RC1] [x86/arm] momd.service服务启动失败 sig/oVirt openEuler-23.03-round-1 I6IJ1A [23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败 sig/oVirt openEuler-23.03-round-2 I6MLF5 【EBS】cjs build problem in openEuler:23.03:Epol sig/sig-cinnamon openEuler-23.03-round-2 I6KQJV [23.03rc2][arm/x86]ignition-delete-config.service服务enable后再次启动,启动报错 sig/sig-K8sDistro openEuler-23.03-round-1 I6GDCI 【EBS】python-nbxmpp在openEuler:23.03工程安装失败问题 sig/sig-mate-desktop openEuler-23.03-round-2 I6MKZF 测试套dsoftbus_basic_test概率失败 sig/sig-QA openEuler-23.03-round-2 I6LHW5 keyctl request/request2/prequest2命令参数执行失败 sig/sig-security-fac openEuler-23.03-round-2 I6KIWU [23.03RC2][arm/x86]biometric-authentication.service服务启动失败 sig/sig-UKUI openEuler-23.03-round-1 I6IJ0T 【23.03 round1】【arm/x86】claws-mail-plugins-tnef安装时缺少libytnef.so.0 sig/sig-UKUI openEuler-23.03-round-1 I6IRQ0 【23.03】ebs中缺少ukui包 sig/sig-UKUI openEuler-23.03-round-1 I6GBZ0 【EBS】yocto-opkg-utils安装缺依赖在openEuler:23.03 sig/sig-Yocto openEuler-23.03-round-2 I6LK73 创建sm4加密设备,出现crash sig/Storage openEuler-23.03-round-2 I6LLA2 用两个设备创建raid0后,将其中一个底层设备置错,结果不符合预期 sig/Storage openEuler-23.03-round-2 I6MAMB 创建raid4或raid5阵列时某个盘变成了热备盘 sig/Storage 附件2: release-plan Stage name Begin time End time Days Note Collect key features 2022/12/01 2023/1/15 46 收集23.03版本关键特性(各SIG自行录入release-plan) Develop 2023/1/4 2023/2/20 46 特性完成开发和自验证,代码提交合入23.03 内核升级 2023/1/4 2023/1/16 12 master主线升级内核到6.1 BaseOS构建 2023/1/16 2023/1/31 15 Master主线BaseOS构建,基础包能用 BaseOS测试 2023/2/1 2023/2/3 3 内核升级后BaseOS可用 分支全量Build 2023/2/6 2023/2/10 4 从master拉23.03分支,完成分支全量构建,基础包升级完毕 Alpha 2023/2/13 2023/2/22 4 软件包升级完成,首版本发布 Test round 1 2023/2/23 2023/3/1 5 版本启动测试,内核冻结 Test round 2 2023/3/2 2023/3/7 6 Test round 3 <- here 2023/3/11 2023/3/15 5 特性合入冻结,不再接纳新特性代码合入 Test round 4 2023/3/16 2023/3/19 3 Test round 5 2023/3/20 2023/3/22 3 Release 2023/3/30 2023/3/30 1 BR 王伟(openEuler release SIG)
1
0
0
0
openEuler update_20230308版本发布公告
by muyuying
12 Mar '23
12 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230308发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230308发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230308发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230308发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/19)提供 update_ 20230315 版本。 openEuler-20.03-LTS-SP1 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷36个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVB?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-0461 kernel 1 CVE-2023-1073 kernel 1 CVE-2023-1076 kernel 1 CVE-2023-1078 kernel 1 CVE-2023-1095 kernel 1 CVE-2023-1118 kernel 1 CVE-2023-23000 kernel 1 CVE-2023-26607 kernel 7.1 Bugfix: issue 仓库 #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages() kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞12个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVC?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-10775 ovirt-engine 5.3 CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-0461 kernel 1 CVE-2023-1073 kernel 1 CVE-2023-1076 kernel 1 CVE-2023-1078 kernel 1 CVE-2023-1095 kernel 1 CVE-2023-1118 kernel 1 CVE-2023-23000 kernel 1 CVE-2023-26607 kernel 7.1 Bugfix: issue 仓库 #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages() kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230308 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞4个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVD?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2023-23009 libreswan 7.5 Bugfix: issue 仓库 #I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息 unbound #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6L25Z:update_20230308 Multi-Version_OpenStack-Wallaby_openEuler-22.03-LTS分支修复openstack依赖问题 python-chardet openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷21个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVA?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-22796 rubygem-activesupport 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2022-3560 pesign 5.5 CVE-2023-0240 kernel 7.8 CVE-2023-0615 kernel 5.5 CVE-2023-0045 kernel 5.1 CVE-2023-20938 kernel 8.8 CVE-2023-23586 kernel 5.5 CVE-2022-47629 libksba 9.8 CVE-2023-23009 libreswan 7.5 CVE-2023-24998 apache-commons-fileupload 7.5 Bugfix: issue 仓库 #I6IQTA:openldap开启build_cross宏支持交叉编译 openldap #I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息 unbound #I6L1MK:update_20230308 fix ipnetns attach failed iproute openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I657VS 【22.03_LTS_SP1_RC2】【x86/arm】dde-api不存在安全的编译选项PIE、STRIP dde-api sig-DDE I657VT 【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP dde-daemon sig-DDE I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I657W7 【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP deepin-system-monitor sig-DDE I6583U 【22.03_LTS_SP1_RC2】【x86/arm】startdde不存在安全的编译选项PIE、STRIP startdde sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-26607 I6HWPB 0.64 7.1 risc-v-kernel sig-RISC-V CVE-2023-26605 I6HWOX 0.64 7.8 risc-v-kernel sig-RISC-V CVE-2023-26606 I6HWOO 0.64 7.8 risc-v-kernel sig-RISC-V CVE-2023-1077 I6I7UG 1.39 7.0 risc-v-kernel sig-RISC-V CVE-2023-22995 I6IEHV 1.89 7.8 risc-v-kernel sig-RISC-V CVE-2023-22995 I6IEH4 1.89 7.8 kernel Kernel CVE-2022-41723 I6IKBL 2.35 7.5 perl-Net-HTTP Programming-language CVE-2023-27371 I6IKCF 2.51 7.5 libmicrohttpd Application CVE-2023-1017 I6IUP1 3.01 7.8 libtpms sig-security-facility CVE-2022-25937 I6EUG8 3.1 6.5 openstack-glance sig-openstack CVE-2023-1118 I6IW01 3.53 7.8 kernel Kernel CVE-2023-23003 I6IXRI 3.66 7.8 risc-v-kernel sig-RISC-V CVE-2023-23003 I6IXPB 3.66 7.8 kernel Kernel CVE-2023-25730 I6F4RP 4.41 0.0 firefox Application CVE-2023-25739 I6F4RO 4.41 0.0 firefox Application CVE-2023-25736 I6F4RN 4.41 0.0 firefox Application CVE-2023-25738 I6F4RM 4.41 0.0 firefox Application CVE-2023-25731 I6F4RL 4.41 0.0 firefox Application CVE-2023-25735 I6F4RK 4.41 0.0 firefox Application CVE-2023-25740 I6F4RJ 4.41 0.0 firefox Application CVE-2023-25744 I6F4RI 4.41 0.0 firefox Application CVE-2023-25746 I6F4RH 4.41 0.0 firefox Application CVE-2023-25742 I6F4RG 4.41 0.0 firefox Application CVE-2023-25728 I6F4RF 4.41 0.0 firefox Application CVE-2023-25737 I6F4RE 4.41 0.0 firefox Application CVE-2023-25734 I6F4RD 4.41 0.0 firefox Application CVE-2023-25745 I6F4RA 4.41 0.0 firefox Application CVE-2023-25743 I6F4R8 4.41 0.0 firefox Application CVE-2023-25741 I6F4R6 4.41 0.0 firefox Application CVE-2023-25729 I6F4R2 4.41 0.0 firefox Application CVE-2023-25732 I6F4QX 4.41 0.0 firefox Application CVE-2023-25733 I6F4QT 4.41 0.0 firefox Application CVE-2023-0767 I6F4QN 4.41 0.0 firefox Application CVE-2022-27672 I6FB6C 4.91 4.7 kernel Kernel CVE-2022-38090 I6FDF4 5.03 4.4 microcode_ctl System-tool CVE-2022-33196 I6FDF2 5.03 6.7 microcode_ctl System-tool CVE-2023-23934 I6FDE3 5.03 3.5 python-werkzeug Programming-language CVE-2023-23918 I6GFMC 5.23 7.5 nodejs sig-nodejs CVE-2023-0778 I6FEKK 5.28 0.0 podman sig-CloudNative CVE-2016-3092 I6JLSA 5.72 7.5 struts sig-Java CVE-2023-20052 I6FMJU 5.95 0.0 clamav Others CVE-2023-0616 I6FOOO 6.14 0.0 thunderbird sig-desktop-apps CVE-2023-0662 I6FWA8 6.94 5.3 php Base-service CVE-2023-0567 I6FXSZ 7.01 0.0 php Base-service CVE-2023-23586 I6FYP9 7.14 5.5 kernel Kernel CVE-2019-17003 I6FZ58 7.26 6.1 thunderbird sig-desktop-apps CVE-2019-17003 I6FZ57 7.26 6.1 mozjs78 Desktop CVE-2019-17003 I6FZ56 7.26 6.1 firefox Application CVE-2023-26604 I6JZ81 7.63 7.8 systemd Base-service CVE-2022-36397 I6FZ5I 8.61 7.8 kernel Kernel CVE-2023-1220 I6KVOV 9.64 8.8 chromium Application CVE-2023-1227 I6KVOD 9.64 8.8 chromium Application CVE-2023-1219 I6KVLQ 9.64 8.8 chromium Application CVE-2023-1218 I6KVL8 9.64 8.8 chromium Application CVE-2023-1216 I6KVKV 9.64 8.8 chromium Application CVE-2023-1213 I6KYB7 9.76 8.8 chromium Application CVE-2023-1214 I6KYB6 9.76 8.8 chromium Application CVE-2023-23920 I6GGBS 10.08 4.2 nodejs sig-nodejs CVE-2021-33639 I6H235 12.02 0.0 risc-v-kernel sig-RISC-V CVE-2023-23039 I6H8HC 12.83 5.7 kernel Kernel CVE-2023-23039 I6H8H5 12.83 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 12.83 5.5 freeimage dev-utils openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95511.7855BC70]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
← Newer
1
...
33
34
35
36
37
38
39
...
72
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Results per page:
10
25
50
100
200