mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
List overview
Download
Release
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
release@openeuler.org
4 participants
734 discussions
Start a n
N
ew thread
openEuler update_20230405版本发布公告
by muyuying
13 Apr '23
13 Apr '23
Dear all, 因上周清明假期,上周的版本(update_20230405)发布时间延期至本周,请谅解。 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230405发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230405发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230405发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230405发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/16)提供 update_ 20230412 版本。 openEuler-20.03-LTS-SP1 Update 20230405 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞15个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7U?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-28487 sudo 5.3 CVE-2023-28486 sudo 5.3 CVE-2023-0466 openssl 5.6 CVE-2023-0465 openssl 5.6 CVE-2023-0464 openssl 7.5 CVE-2023-25180 glib2 6.2 CVE-2023-24593 glib2 6.2 CVE-2023-1370 json-smart 7.5 CVE-2023-1108 undertow 7.5 CVE-2018-16438 hdf5 8.8 CVE-2018-14031 hdf5 8.8 CVE-2023-28772 kernel 7.8 CVE-2023-28328 kernel 5.5 CVE-2023-1513 kernel 7.5 CVE-2023-1380 kernel 6.6 Bugfix: issue 仓库 #I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230405 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问1个,已知漏洞13个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7V?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2018-14031 hdf5 8.8 CVE-2018-16438 hdf5 8.8 CVE-2023-28487 sudo 5.3 CVE-2023-28486 sudo 5.3 CVE-2023-28328 kernel 5.5 CVE-2023-1380 kernel 6.6 CVE-2023-1513 kernel 7.5 CVE-2023-0464 openssl 7.5 CVE-2023-0465 openssl 5.6 CVE-2023-0466 openssl 5.6 CVE-2023-25180 glib2 6.2 CVE-2023-24593 glib2 6.2 CVE-2023-1108 undertow 7.5 Bugfix: issue 仓库 #I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230405 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞16个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7W?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-28487 sudo 5.3 CVE-2023-28486 sudo 5.3 CVE-2018-14031 hdf5 8.8 CVE-2018-16438 hdf5 8.8 CVE-2022-29901 kernel 6.5 CVE-2022-4269 kernel 5.5 CVE-2023-28327 kernel 5.5 CVE-2023-28328 kernel 5.5 CVE-2023-1380 kernel 6.6 CVE-2023-1513 kernel 7.5 CVE-2023-0464 openssl 7.5 CVE-2023-0465 openssl 5.6 CVE-2023-0466 openssl 5.6 CVE-2023-25180 glib2 6.2 CVE-2023-24593 glib2 6.2 CVE-2023-1108 undertow 7.5 Bugfix: issue 仓库 #I6SFHJ:开源主线网络补丁回合 kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230405 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞22个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7T?from=project-i…
CVE修复: CVE 仓库 score CVE-2018-14031 hdf5 8.8 CVE-2018-16438 hdf5 8.8 CVE-2023-28487 sudo 5.3 CVE-2023-28486 sudo 5.3 CVE-2023-23004 kernel 5.5 CVE-2023-1249 kernel 5.5 CVE-2023-28327 kernel 5.5 CVE-2023-28328 kernel 5.5 CVE-2023-1380 kernel 6.6 CVE-2023-28466 kernel 7 CVE-2022-48424 kernel 7.8 CVE-2022-48423 kernel 7.8 CVE-2022-48425 kernel 7.8 CVE-2023-1281 kernel 7.8 CVE-2023-25809 runc 5 CVE-2023-0466 openssl 5.6 CVE-2023-0465 openssl 5.6 CVE-2023-24593 glib2 6.2 CVE-2023-25180 glib2 6.2 CVE-2023-0464 openssl 7.5 CVE-2023-1513 kernel 7.5 CVE-2023-1108 undertow 7.5 Bugfix: issue 仓库 #I6SFHJ:开源主线网络补丁回合 kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.13日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-1390 I6N7CV 0.49 6.5 risc-v-kernel sig-RISC-V CVE-2023-28176 I6N797 0.49 0.0 firefox Application CVE-2023-28159 I6N78R 0.49 0.0 firefox Application CVE-2023-28161 I6N8CG 0.52 0.0 firefox Application CVE-2023-28160 I6N89T 0.52 0.0 firefox Application CVE-2023-28164 I6N87J 0.52 6.1 firefox Application CVE-2023-28162 I6N860 0.52 0.0 firefox Application CVE-2023-28177 I6N8JV 0.53 0.0 firefox Application CVE-2023-28163 I6N8EY 0.53 0.0 firefox Application CVE-2023-25751 I6N97Z 0.55 0.0 firefox Application CVE-2023-25752 I6N96P 0.55 6.1 firefox Application CVE-2023-25750 I6N96C 0.55 0.0 firefox Application CVE-2023-25748 I6N965 0.55 0.0 firefox Application CVE-2023-25749 I6N960 0.55 0.0 firefox Application CVE-2023-26485 I6S7WH 2.0 7.5 cmark CVE-2023-24824 I6S7WF 2.0 7.5 cmark CVE-2023-27593 I6O473 3.04 5.5 cilium sig-high-performance-network CVE-2023-26916 I6SX7D 4.73 7.5 libyang sig-high-performance-network CVE-2023-1838 I6T1EZ 5.23 7.1 risc-v-kernel sig-RISC-V CVE-2023-24534 I6T1HL 5.36 7.5 golang sig-golang CVE-2023-24537 I6T1HJ 5.36 8.1 golang sig-golang CVE-2022-4900 I6OOSB 5.98 0.0 php Base-service CVE-2023-28840 I6T4RE 6.0 7.5 moby CVE-2023-28840 I6T4RC 6.0 7.5 docker sig-CloudNative CVE-2023-28425 I6OW4W 6.72 5.5 redis5 sig-bigdata CVE-2023-28425 I6OW46 6.72 5.5 redis Others CVE-2023-28425 I6OW3K 6.72 5.5 python-redis Base-service CVE-2023-28425 I6OW2W 6.72 5.5 redis6 sig-bigdata CVE-2023-1544 I6OZK3 6.85 5.5 qemu Virt CVE-2023-28708 I6PBXT 7.89 4.3 tomcat Application CVE-2023-1583 I6PDF8 8.22 5.5 risc-v-kernel sig-RISC-V CVE-2023-23913 I6PDIP 8.39 0.0 rubygem-rails sig-ruby CVE-2023-1410 I6PLY9 8.76 4.8 grafana Application CVE-2023-0160 I6PPPN 9.0 0.0 risc-v-kernel sig-RISC-V CVE-2023-0870 I6PQ87 9.11 6.7 openstack-horizon sig-openstack CVE-2023-1611 I6PQCU 9.24 6.3 risc-v-kernel sig-RISC-V CVE-2021-3923 I6Q365 10.27 2.3 risc-v-kernel sig-RISC-V CVE-2023-1625 I6Q3J1 10.47 0.0 openstack-heat sig-openstack CVE-2023-1637 I6QEZ5 12.37 5.5 risc-v-kernel sig-RISC-V CVE-2023-28866 I6QHVX 12.52 5.3 risc-v-kernel sig-RISC-V CVE-2023-28859 I6QRYO 12.99 6.5 redis6 sig-bigdata CVE-2023-28859 I6QRYL 12.99 6.5 redis5 sig-bigdata CVE-2023-28859 I6QRYK 12.99 6.5 redis Others CVE-2023-28859 I6QRYH 12.99 6.5 python-redis Base-service CVE-2023-25661 I6QSNP 13.14 6.5 tensorflow sig-ai CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
Release SIG邀请您参加2023年4月20日~21日openEuler Developer Day SIG组开放工作会议
by chemingdao
13 Apr '23
13 Apr '23
你好! openEuler Developer Day 2023(简称 ODD 2023)— openEuler社区年度顶级会议, 是开放原子开源基金会旗下 openEuler 社区发起的开发者峰会。 ODD 2023将于2023年4月20日~21日在上海浦东嘉里酒店举行,欢迎大家报名参会。
会议议程及相关信息可参考峰会链接:https://www.openeuler.org/zh/interaction/summit-list/devda…
报名链接:https://e-campaign.huawei.com/m/RNN3Yz
另外openEuler Release SIG邀请您参加4月21日下午16:00 – 17:30进行的ODD 2023 Release SIG组线下开放工作会议, 届时可与社区开发者,贡献者面对面交流。 目前已收集的议题: 1、openEuler 长期版本演进计划 2、openEuler 社区 6.X 内核演进协作讨论 3、openEuler Release SIG maintainer & 版本管理运作机制讨论 4、openEuler 维护版本质量规范 议题申报:线下开放工作会议提前收集议题,请按“议题名+介绍+需求发起人”的形式提交在etherpad:
https://etherpad.openeuler.org/p/sig-release-management-meetings
BR 车明道 Release SIG
1
0
0
0
openEuler 22.03 LTS SP2版本需求收集,请大家反馈需要合入22.03 LTS SP2版本特性
by Sujinling
06 Apr '23
06 Apr '23
大家好, openEuler 22.03 LTS SP2版本需求开始收集 , 请大家反馈需要合入openEuler 22.03 LTS SP2版本特性。 特性申请清单:
https://gitee.com/openeuler/release-management/blob/master/openEuler-22.03-…
建议大家4月15日前完成特性申报,release将于4月16日至4月30日完成所有特性评审。 需求申请流程如下:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E9%9C%…
1
1
0
0
openEuler update_20230329版本发布公告
by muyuying
01 Apr '23
01 Apr '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230329发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230329发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230329发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供 update_ 20230405 版本。 openEuler-20.03-LTS-SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41725 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41723 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27538 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27535 curl 5.8 CVE-2023-27534 curl 4.5 CVE-2023-27533 curl 4.5 CVE-2023-26769 liblouis 7.5 CVE-2022-36021 redis 5.5 CVE-2023-28466 kernel 7 CVE-2023-1382 kernel 0 CVE-2023-1281 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2022-4269 kernel 5.5 CVE-2022-29901 kernel 5.6 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-29901 kernel 5.6 CVE-2022-4269 kernel 5.5 CVE-2023-1079 kernel 6.8 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6D0K1:例行分析grub2软件包补丁 grub2 #I6KMOJ:grub2支持tpcm3.0特性 grub2 #I6L25L:shim支持可信计算3.0tpcm特性 shim #I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 CVE-2022-48423 kernel 7.8 CVE-2022-48424 kernel 7.8 CVE-2022-48425 kernel 7.8 CVE-2023-1079 kernel 6.8 CVE-2023-1249 kernel 4.1 CVE-2023-1281 kernel 7.8 CVE-2023-1382 kernel 0 CVE-2023-22999 kernel 5.5 CVE-2023-28466 kernel 7 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I6MTKW:【grub2】grub2-rpm-sort命令执行报错 grub2 #I6RDEF:update20230329 添加sw架构 perftest #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230329 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-i…
CVE修复: CVE 仓库 score CVE-2020-12762 libfastjson 7.8 CVE-2022-41723 golang 7.5 CVE-2022-41724 golang 7.5 CVE-2022-41725 golang 7.5 CVE-2023-28617 emacs 9.8 CVE-2023-27533 curl 4.5 CVE-2023-27534 curl 4.5 CVE-2023-27535 curl 5.8 CVE-2023-27536 curl 5.8 CVE-2023-27538 curl 5.8 CVE-2023-1161 wireshark 7.1 CVE-2022-36021 redis 5.5 CVE-2023-26769 liblouis 7.5 Bugfix: issue 仓库 #I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release perl-libintl-perl #I6RE2O:update20230329 [Update] Update to v0.4.1 pin-gcc-client #I64VTB:执行命令报错error -4 papi #I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2 procps-ng #I6GCRA:部署好server,client,插入ko,虚拟机重启 dpu-utilities #I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率 st,st占用率一直显示为0 procps-ng #I6RE77:update20230329 update syscare to 1.0.1 syscare #I67PXN:fix changelog date error rsyslog #I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 vim #I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-25664 I6Q9HZ 0.17 9.8 tensorflow sig-ai CVE-2023-27586 I6OW3B 3.0 7.1 python-cairosvg CVE-2023-0386 I6PBWH 4.17 7.8 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1194 I6KDP0 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 4.26 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWP 4.38 0.0 risc-v-kernel sig-RISC-V CVE-2023-0464 I6PDB8 4.42 7.5 openssl sig-security-facility CVE-2023-1249 I6KT9F 5.26 5.5 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 5.26 5.5 kernel Kernel CVE-2023-28772 I6PRCO 5.75 7.8 kernel Kernel CVE-2023-1108 I6KVMO 5.76 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 5.8 6.5 libmemcached Programming-language CVE-2023-25669 I6Q38F 6.67 7.5 tensorflow sig-ai CVE-2023-25670 I6Q38E 6.67 7.5 tensorflow sig-ai CVE-2023-25659 I6Q37O 6.67 7.5 tensorflow sig-ai CVE-2023-25658 I6Q37N 6.67 7.5 tensorflow sig-ai CVE-2023-25673 I6Q9HC 7.16 7.5 tensorflow sig-ai CVE-2023-25671 I6Q9HA 7.16 7.5 tensorflow sig-ai CVE-2023-25665 I6Q9H7 7.16 7.5 tensorflow sig-ai CVE-2023-27579 I6Q9G1 7.16 7.5 tensorflow sig-ai CVE-2023-25663 I6Q9IB 7.17 7.5 tensorflow sig-ai CVE-2023-25666 I6Q9I8 7.17 7.5 tensorflow sig-ai CVE-2023-25667 I6Q9I6 7.17 7.5 tensorflow sig-ai CVE-2023-25660 I6Q9I4 7.17 7.5 tensorflow sig-ai CVE-2023-25674 I6Q9HW 7.17 7.5 tensorflow sig-ai CVE-2023-25662 I6Q9HP 7.17 7.5 tensorflow sig-ai CVE-2023-25672 I6Q9HK 7.17 7.5 tensorflow sig-ai CVE-2023-1289 I6LKHN 7.38 5.5 ImageMagick Others CVE-2011-5034 I6LPRE 7.96 0.0 geronimo-saaj sig-Java CVE-2023-1436 I6P70O 11.35 7.5 jettison dev-utils CVE-2023-1370 I6MX6A 11.35 7.5 json-smart sig-Java CVE-2023-1032 I6MSIY 11.63 0.0 kernel Kernel CVE-2023-28176 I6N797 12.77 0.0 firefox Application CVE-2023-28159 I6N78R 12.77 0.0 firefox Application CVE-2023-1390 I6N7CV 12.78 6.5 risc-v-kernel sig-RISC-V CVE-2023-28164 I6N87J 12.8 6.1 firefox Application CVE-2023-28162 I6N860 12.8 0.0 firefox Application CVE-2023-28177 I6N8JV 12.81 0.0 firefox Application CVE-2023-28163 I6N8EY 12.81 0.0 firefox Application CVE-2023-28161 I6N8CG 12.81 0.0 firefox Application CVE-2023-28160 I6N89T 12.81 0.0 firefox Application CVE-2023-25752 I6N96P 12.83 6.1 firefox Application CVE-2023-25750 I6N96C 12.83 0.0 firefox Application CVE-2023-25748 I6N965 12.83 0.0 firefox Application CVE-2023-25749 I6N960 12.83 0.0 firefox Application CVE-2023-25751 I6N97Z 12.84 0.0 firefox Application CVE-2023-28328 I6NCQH 13.0 0.0 kernel Kernel CVE-2023-28327 I6NCP2 13.0 0.0 kernel Kernel CVE-2023-1380 I6NCVX 13.01 0.0 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler release sig例会
by openEuler conference
30 Mar '23
30 Mar '23
您好! sig-release-management SIG 邀请您参加 2023-03-31 10:00 召开的Zoom会议(自动录制) 会议主题:openEuler release sig例会 会议内容: 1. openEuler 23.03创新版本release发布评审 2. openEuler 22.03 LTS SP2版本计划讨论 3. openEuler update维护版本情况例行汇报 其它 会议链接:https://us06web.zoom.us/j/83836682556?pwd=YmFKcGdNOVUwWTRlNFo0Q1VnR3ZYQT09
会议纪要:https://etherpad.openeuler.org/p/sig-release-management-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-release-management SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-31 10:00, The subject of the conference is openEuler release sig例会, Summary: 1. openEuler 23.03创新版本release发布评审 2. openEuler 22.03 LTS SP2版本计划讨论 3. openEuler update维护版本情况例行汇报 其它 You can join the meeting at
https://us06web.zoom.us/j/83836682556?pwd=YmFKcGdNOVUwWTRlNFo0Q1VnR3ZYQT09
. Add topics at
https://etherpad.openeuler.org/p/sig-release-management-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
openEuler 23.03 RC5版本release公告
by Wangwei (Bessel)
29 Mar '23
29 Mar '23
Dear all, openEuler 23.03 RC5版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC5版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件,版本严重/主要问题基本闭环(经决策后的少量遗留问题见附件1),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/31)将会在release-management-sig例会进行版本发布评审。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC5版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc5_openeuler-2023-03-2…
openEuler 23.03 RC5版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC5版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
附件1: 版本遗留问题清单 任务标题 根因分析 影响分析 标签 任务路径 [23.03RC1][arm/x86] ipa-epn.service服务启动失败 执行ipa-client-install时,需要连接到 FreeIPA 服务器。ipa服务器配置需要安装ipa-server相关包,目前查到的结果是必须要ipa-server相关包才行;未引入ipa-server包 影响大小:小 影响功能:当前没有相关使用场景,通过ipa-client-install命令配置时,需要连接到 FreeIPA 服务器。ipa服务器配置需要安装ipa-server相关包,当前社区未引入,后续引入后重新配置。 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6I1F7
[23.03RC1][arm/x86]mom-vdsm.service服务启动失败 添加ovirt主机需要 postgresql-jdbc软件包版本为42.2.4,当前社区版本为42.4.1,建议issue遗留 影响大小:小 影响功能:无法添加ovirt主机,需要需要通过此文档方式部署
https://www.kdocs.cn/l/cmzyU7dYxwSr
sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IGXA
[23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IJ1A
[23.03RC1][arm/x86] nmcli配置MACsec失败 做了测试可以确认这个issue和wpa_supplicant和openssl无关,具体原因还需要时间查找。初步判断是kernel里面的macsec设备配合方面有问题,无法grab 影响小,wifi状态下的媒体访问控制安全(MACsec)无法使用,其他功能都正常 sig/Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6INQT
【openEuler-23.03】【arm】syzkaller服务报Driver 'virtio_gpudrmfb' missed to adjust virtual screen size等错误 6.1内核版本不做模糊测试 无 sig/Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6IZEN
[23.03RC2][arm/x86]driver-installer.service服务enable后启动,日志有报错 目前的存在的其他问题为程序在用户点击时会调用执行脚本,脚本路径在程序中多个地方硬编码为 /usr/lib/deepin-graphics-driver-manager 目录下,而目前的脚本打包路径为 /usr/lib64 已修复,影响小,暂无独立显卡的机器进行验证,且该软件只是用来管理显卡的,不影响其他功能使用。在推动统信验证中 sig/sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I6KP18
缺失perf-debuginfo包 23.03创新版本的6.1内核后续不会长期演进,考虑没有必要提供debuginfo包 影响小,perf调试若有诉求,用户可自行编译perf-debuginfo sig/Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6LKXG
【23.03】Fastdb应用make -j64编译卡死 经调试,关闭插件pass的内容,仅启用通信子系统的功能。在lto场景下,会出现make -j卡死的情况。 经过分析,判断是多进程场景下没有正常释放client的资源 影响小,make -j1的情况下是能够正常使能插件框架的功能。添加make -j多进程编译的限制条件后,不会对插件框架的使用、以及其他任何项目产生影响。 sig/Compiler
https://gitee.com/src-openeuler/pin-gcc-client/issues/I6QWQY
附件2: release-plan [cid:image001.jpg@01D9626F.0D507990] BR 王伟(openEuler release SIG)
1
0
0
0
openEuler update_20230322版本发布公告
by muyuying
26 Mar '23
26 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230322发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230322发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/02)提供 update_ 20230329 版本。 openEuler-20.03-LTS-SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCM?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞5个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCO?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞2个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCP?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6DM2X:兼容-accel参数 stratovirt #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I5YM6P:openEuler 22.03 LTS Next版本python-chardet软件升级至5.0.0 python-chardet #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask<
https://gitee.com/open_euler/dashboard?issue_id=I6NVPT
> kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞5个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCL?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 CVE-2023-1074 kernel 4.7 CVE-2023-1079 kernel 6.8 CVE-2023-1382 kernel 0 Bugfix: issue 仓库 #I6P9BJ:update20230322-update iputils to version 20221126 iputils #I6DM2X:兼容-accel参数 stratovirt #I6ORHV:【22.03_LTS_SP1】jemalloc版本需要从5.2.1升级到5.3.0 jemalloc #I6NY9Y:22.03-openEuler-LTS-SP1升级zbar,通过升级合入上游社区修复的一系列问题 zbar #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-48423 I6OD4U 1.61 9.8 kernel Kernel CVE-2021-3329 I6HUIN 3.0 6.5 zephyr CVE-2023-1076 I6I7UH 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U8 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-20860 I6PDX0 4.6 9.1 springframework sig-Java CVE-2023-28466 I6NIUR 4.61 7.0 kernel Kernel CVE-2023-28466 I6NIUL 4.61 7.0 risc-v-kernel sig-RISC-V CVE-2023-27781 I6NIU2 4.61 7.8 jpegoptim Application CVE-2023-1095 I6IK9V 5.25 5.5 risc-v-kernel sig-RISC-V CVE-2023-1018 I6IKCI 5.5 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 5.52 5.9 firefox Application CVE-2023-22997 I6IKXC 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 5.6 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 5.6 5.5 kernel Kernel CVE-2023-22998 I6IKWF 5.6 5.5 kernel Kernel CVE-2023-22999 I6IKXV 5.61 5.5 risc-v-kernel sig-RISC-V CVE-2023-25155 I6IRPL 5.87 6.5 redis Others CVE-2023-25155 I6IRP9 5.87 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 5.87 6.5 redis5 sig-bigdata CVE-2022-36021 I6IRS4 5.88 5.5 redis Others CVE-2022-36021 I6IRRY 5.88 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 5.88 5.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 5.92 0.0 edk2 Virt CVE-2019-14561 I6ISWY 5.92 0.0 edk2 Virt CVE-2023-22462 I6ITUB 5.95 5.4 grafana Application CVE-2023-27594 I6O472 6.19 7.3 cilium sig-high-performance-network CVE-2023-0594 I6IVYK 6.25 5.4 grafana Application CVE-2023-0507 I6IVYI 6.25 5.4 grafana Application CVE-2023-23004 I6IXRY 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 6.65 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 6.65 5.5 kernel Kernel CVE-2023-23002 I6IXOH 6.65 5.5 kernel Kernel CVE-2023-23005 I6IXO8 6.65 5.5 kernel Kernel CVE-2023-23001 I6IXNW 6.65 5.5 kernel Kernel CVE-2023-1161 I6JJJE 8.25 6.5 wireshark Application CVE-2022-48425 I6OD5R 8.61 7.8 kernel Kernel CVE-2022-48424 I6OD4P 8.61 7.8 kernel Kernel CVE-2023-1281 I6OP9S 9.51 7.8 kernel Kernel CVE-2023-27586 I6OW3B 9.87 7.1 python-cairosvg CVE-2022-41725 I6OXZH 9.93 7.5 golang sig-golang CVE-2022-41724 I6OXZB 9.93 7.5 golang sig-golang CVE-2022-41723 I6OXYJ 9.93 7.5 golang sig-golang CVE-2019-10358 I6K7LN 10.87 6.5 maven2 sig-Java CVE-2017-1000397 I6K7IR 10.87 5.9 maven2 sig-Java CVE-2023-1194 I6KDP0 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 11.13 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDP1 11.13 0.0 kernel Kernel CVE-2023-1193 I6KEWP 11.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWO 11.25 6.5 kernel Kernel CVE-2023-1249 I6KT9F 12.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 12.12 4.1 kernel Kernel CVE-2023-1252 I6KTT3 12.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1108 I6KVMO 12.63 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 12.66 6.5 libmemcached Programming-language CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler 23.03 RC4版本release公告
by Wangwei (Bessel)
23 Mar '23
23 Mar '23
Dear all, openEuler 23.03 RC4版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC4版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件,版本严重/主要问题基本闭环(经决策后的少量遗留严重/主要问题见附件1,需要在RC4阶段社区协作重点解决),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/27)将会提供 RC5 版本。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC4版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc4_openeuler-2023-03-2…
openEuler 23.03 RC4版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC4版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
附件1: 当前遗留问题清单 ,请对应owner在27日前解决,若不解决请在release-management sig会议讨论是否可以移除;RC5前未解决问题,按照社区原则将不带入openEuler 23.03版本 任务ID 任务标题 任务状态 标签 任务路径 I6GCHU 【EBS】 tensorflow build problem in openEuler:23.03 待办的 sig/ai
https://gitee.com/open_euler/dashboard?issue_id=I6GCHU
I6INQT [23.03RC1][arm/x86] nmcli配置MACsec失败 已确认 sig/Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6INQT
I6OWBC [23.03]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 待办的 sig/Desktop
https://gitee.com/open_euler/dashboard?issue_id=I6OWBC
I6OM4Z isula load大镜像失败 待办的 sig/iSulad
https://gitee.com/open_euler/dashboard?issue_id=I6OM4Z
I6IJ1A [23.03RC1][arm/x86] ovirt-vmconsole-host-sshd.service服务启动失败 待办的 sig/oVirt
https://gitee.com/open_euler/dashboard?issue_id=I6IJ1A
I6LFW1 【EBS】libkae build problem in openEuler:23.03 待办的 sig/sig-AccLib
https://gitee.com/open_euler/dashboard?issue_id=I6LFW1
I6HNR7 【EBS】caja-extensions build problem in openEuler:23.03:Epol 待办的 sig/sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I6HNR7
I6IV5K 【OBS&EBS】system-config-users-docs build problem in openEuler:23.03:Epol 修复中 sig/sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I6IV5K
I6KIWU [23.03RC2][arm/x86]biometric-authentication.service服务启动失败 修复中 sig/sig-UKUI
https://gitee.com/open_euler/dashboard?issue_id=I6KIWU
I6HK2K 【EBS】tcmu-runner build problem in openEuler:23.03:Epol 待办的 sig/Storage
https://gitee.com/open_euler/dashboard?issue_id=I6HK2K
附件2: release-plan [cid:image003.jpg@01D95DA1.EB885AC0] BR 王伟(openEuler release SIG)
1
0
0
0
Release SIG 例会
by openEuler conference
22 Mar '23
22 Mar '23
您好! sig-release-management SIG 邀请您参加 2023-03-24 10:00 召开的Zoom会议(自动录制) 会议主题:Release SIG 例会 会议内容: 1、openEuler 23.03 创新版本进展 2、openEuler 22.03 LTS SP2 release plan 讨论 3、update维护版本例行汇报 4、其他议题欢迎申报 会议链接:https://us06web.zoom.us/j/85939057497?pwd=MmNHQUhMYkxTVzhZY3I0cnQrZWtXZz09
会议纪要:https://etherpad.openeuler.org/p/sig-release-management-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-release-management SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-24 10:00, The subject of the conference is Release SIG 例会, Summary: 1、openEuler 23.03 创新版本进展 2、openEuler 22.03 LTS SP2 release plan 讨论 3、update维护版本例行汇报 4、其他议题欢迎申报 You can join the meeting at
https://us06web.zoom.us/j/85939057497?pwd=MmNHQUhMYkxTVzhZY3I0cnQrZWtXZz09
. Add topics at
https://etherpad.openeuler.org/p/sig-release-management-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
2
1
0
0
openEuler update_20230315版本发布公告
by muyuying
19 Mar '23
19 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。 openEuler-20.03-LTS-SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-40899 future 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-27320 sudo 1 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-38751 snakeyaml 6.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本 python-paramiko #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-26081 epiphany 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-27320 sudo 1 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-3560 pesign 5.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-26607 kernel 7.1 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-1175 vim 7.3 CVE-2023-1170 vim 7.8 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-40899 future 7.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6J86M:repo python-lit-15.0.7-1源码包 python-lit #I6K0AO:gala-gopher升级到1.0.2版本 gala-gopher #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6MR9A:例行回合社区补丁 efibootmgr #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxx #I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxxabi #I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 llvm-libunwind openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.19日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-0662 I6FWA8 0.13 5.3 php Base-service CVE-2023-0567 I6FXSZ 0.2 6.2 php Base-service CVE-2019-17003 I6FZ58 0.45 6.1 thunderbird sig-desktop-apps CVE-2023-23039 I6H8H5 6.02 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 6.02 5.5 freeimage dev-utils CVE-2023-26464 I6MI3U 7.87 7.5 log4j12 Application CVE-2021-3329 I6HUIN 9.2 6.5 zephyr CVE-2023-1055 I6I76Q 10.33 5.5 three-eight-nine-ds-base Application CVE-2023-1076 I6I7UH 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7U9 10.58 6.8 kernel Kernel CVE-2023-1075 I6I7U8 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U2 10.58 2.5 kernel Kernel CVE-2023-24533 I6LIQ9 10.8 7.5 golang sig-golang CVE-2023-27781 I6NIU2 10.81 7.8 jpegoptim Application CVE-2023-1073 I6IFV4 11.12 6.3 kernel Kernel CVE-2023-1095 I6IK9V 11.45 5.5 risc-v-kernel sig-RISC-V CVE-2023-1095 I6IK9U 11.45 5.5 kernel Kernel CVE-2023-1018 I6IKCI 11.7 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 11.72 5.9 firefox Application CVE-2023-22999 I6IKXV 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKXC 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 11.81 5.5 kernel Kernel CVE-2023-22998 I6IKWF 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWB 11.81 5.5 kernel Kernel CVE-2022-36021 I6IRS4 12.08 5.5 redis Others CVE-2022-36021 I6IRRY 12.08 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 12.08 5.5 redis5 sig-bigdata CVE-2023-25155 I6IRPL 12.08 6.5 redis Others CVE-2023-25155 I6IRP9 12.08 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 12.08 6.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 12.12 0.0 edk2 Virt CVE-2019-14561 I6ISWY 12.12 0.0 edk2 Virt CVE-2023-22462 I6ITUB 12.16 5.4 grafana Application CVE-2023-0594 I6IVYK 12.45 5.4 grafana Application CVE-2023-0507 I6IVYI 12.45 5.4 grafana Application CVE-2023-23004 I6IXRY 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 12.85 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 12.85 5.5 kernel Kernel CVE-2023-23002 I6IXOH 12.85 5.5 kernel Kernel CVE-2023-23005 I6IXO8 12.85 5.5 kernel Kernel CVE-2023-23001 I6IXNW 12.85 5.5 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel CVE-2023-1161 I6JJJE 14.45 6.5 wireshark Application openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
← Newer
1
...
35
36
37
38
39
40
41
...
74
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
Results per page:
10
25
50
100
200