Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1及openEuler-22.03-LTS-SP2 update版本满足版本出口质量,现进行发布公示。 本公示分为七部分: 1、openEuler-20.03-LTS-SP1 Update 20230809发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230809发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230809发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230809发布情况及待修复缺陷 5、openEuler-22.03-LTS-SP2 Update 20230809发布情况及待修复缺陷 6、openEuler 关键组件待修复CVE 清单 7、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/08/20)提供 update_ 20230816 版本。 openEuler-20.03-LTS-SP1 Update 20230809 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞10个。目前版本分支剩余待修复缺陷20个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I7QYXB?from=project-is... CVE修复: CVE 仓库 score CVE-2022-41409 pcre2 7.5 CVE-2023-35945 nghttp2 7.5 CVE-2023-29406 golang 6.5 CVE-2023-25399 scipy 5.5 CVE-2023-3648 wireshark 5.5 CVE-2023-38403 iperf3 5.5 CVE-2023-3817 openssl 5.3 CVE-2023-3863 kernel 4.1 CVE-2023-38288 libtiff 3.3 CVE-2023-4132 kernel 5.5 Bugfix: issue 仓库 I7R0LI:支持磁盘调优参数可在NVMe 子系统生效 tuned #I7QDRI:【22.03 LTS SP2 update20230802】【arm\x86】22.03 SP2版本的ebtables包在22.03 LTS和22.03 SP1的环境上降级有异常打印 ebtables #I7MPVG:更新jQuery版本,jquery新版本进行了一些漏洞修复 python-sphinx openEuler-20.03-LTS-SP1版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol openEuler-20.03-LTS-SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/ openEuler CVE 及安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 openEuler 20.03-LTS-SP1 I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 主要 sig/sig-recycle libdap openEuler 20.03-LTS-SP1 I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 主要 sig/sig-ROS python-robotframework openEuler 20.03-LTS-SP1 I5DLX7 [20.03 22.03] 管理员指南操作文档mysql服务搭建指导文档有误 主要 sig/doc docs openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 主要 sig/bigdata hadoop openEuler 20.03LTS SP1 update210901 I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 主要 sig/oVirt ovirt-cockpit-sso openEuler 20.03-LTS-SP1 I6VFAE [20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB mariadb openEuler 20.03-LTS-SP1 I4G4A5 Undefine-shift in _bfd_safe_read_leb128 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4B1 Integer overflow in print_vms_time 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4VY memleak in parse_gnu_debugaltlink 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4WW Use-after-free in make_qualified_name 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4X6 memleak in byte_get_little_endian 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4XF memleak in process_mips_specific 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4Y0 out-of-memory in vms_lib_read_index 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4YJ Heap-buffer-overflow in bfd_getl16 无优先级 sig/Base-service binutils openEuler 20.03-LTS-SP1 I4G4YV Floating point exception in _bfd_vms_slurp_etir 无优先级 sig/Base-service binutils openEuler 20.03LTS SP1 update210926 I4CMSV 【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd 无优先级 sig/TC community openEuler 20.03LTS SP1 update220111 I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 无优先级 sig/sig-ai-bigdata flink openEuler-20.03-LTS-SP1 I3QGU7 系统不支持GB18030 无优先级 sig/TC community openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 无优先级 sig/sig-mate-desktop mate-desktop openEuler-20.03-LTS-SP3 Update 20230809 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问3个,已知漏洞9个。目前版本分支剩余待修复缺陷 7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I7QYXC?from=project-is... CVE修复: CVE 仓库 score CVE-2022-41409 pcre2 7.5 CVE-2023-35945 nghttp2 7.5 CVE-2023-29406 golang 6.5 CVE-2023-25399 scipy 5.5 CVE-2023-3648 wireshark 5.5 CVE-2023-38403 iperf3 5.5 CVE-2023-4132 kernel 5.5 CVE-2023-3817 openssl 5.3 CVE-2023-3863 kernel 4.1 Bugfix: issue 仓库 #I7R0LI:支持磁盘调优参数可在NVMe 子系统生效 tuned #I7QDRI:【22.03 LTS SP2 update20230802】【arm\x86】22.03 SP2版本的ebtables包在22.03 LTS和22.03 SP1的环境上降级有异常打印 ebtables #I7MPVG:更新jQuery版本,jquery新版本进行了一些漏洞修复 python-sphinx openEuler-20.03-LTS-SP3版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol openEuler-20.03-LTS-SP3 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/ openEuler CVE及安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 openEuler 20.03 LTS SP3 update20220801 I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 主要 sig/Kernel TCP_option_address openEuler 20.03-LTS-SP3 I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 主要 sig/oVirt ovirt-cockpit-sso openEuler-20.03-LTS-SP3 I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 主要 sig/oVirt vdsm openEuler-20.03-LTS-SP3 I72EAT 【20.03 SP3】php相关包在20.03 LTS SP3降级失败 主要 sig/Base-service php openEuler 20.03LTS SP3 update220111 I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 无优先级 sig/sig-ai-bigdata flink openEuler-20.03-LTS-SP3 I6VFMI [20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB mariadb openEuler-20.03-LTS-SP3 I72HWV 【20.03-lts-sp3】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service php openEuler-22.03-LTS Update 20230809 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞13个。目前版本分支剩余待修复缺陷3个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I7QYXD?from=project-is... CVE修复: CVE 仓库 score CVE-2023-38427 kernel 9.8 CVE-2023-38429 kernel 9.8 CVE-2023-38430 kernel 9.1 CVE-2023-4004 kernel 7.8 CVE-2022-41409 pcre2 7.5 CVE-2023-35945 nghttp2 7.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-29406 golang 6.5 CVE-2023-25399 scipy 5.5 CVE-2023-36191 sqlite 5.5 CVE-2023-3648 wireshark 5.5 CVE-2023-38403 iperf3 5.5 CVE-2023-3817 openssl 5.3 Bugfix: issue 仓库 #I7PH6J:补丁回合 A-Tune-Collector #I7LPQ9:开启堆栈不可执行链接选项 grub2 #I7QDRI:【22.03 LTS SP2 update20230802】【arm\x86】22.03 SP2版本的ebtables包在22.03 LTS和22.03 SP1的环境上降级有异常打印 ebtables #I7FEZH:CVE-2023-36191 sqlite openEuler-22.03-LTS版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:22.03:LTS https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol openEuler-22.03-LTS Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS/update/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/obs... openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig 关联仓库 openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 次要 sig/DB mariadb openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service php openEuler-22.03-LTS update20230726 I7ORCE 【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 主要 sig/SDS ceph openEuler-22.03-LTS-SP1 Update 20230809 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题5个,已知漏洞13个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I7QYXA?from=project-is... CVE修复: CVE 仓库 score CVE-2023-38429 kernel 9.8 CVE-2023-38427 kernel 9.8 CVE-2023-38430 kernel 9.1 CVE-2023-4004 kernel 7.8 CVE-2022-41409 pcre2 7.5 CVE-2023-24607 qt5-qtbase 7.5 CVE-2023-35945 nghttp2 7.5 CVE-2023-29406 golang 6.5 CVE-2023-25399 scipy 5.5 CVE-2023-38403 iperf3 5.5 CVE-2023-36191 sqlite 5.5 CVE-2023-3648 wireshark 5.5 CVE-2023-3817 openssl 5.3 Bugfix: issue 仓库 #I7PH6J:补丁回合 A-Tune-Collector #I7KS8E:关于unlock-pidfile-if-current-proccess-is-NOT-dnf.patch的疑问 dnf #I7LPQ9:开启堆栈不可执行链接选项 grub2 #I7QDRI:【22.03 LTS SP2 update20230802】【arm\x86】22.03 SP2版本的ebtables包在22.03 LTS和22.03 SP1的环境上降级有异常打印 ebtables #I7MPVG:更新jQuery版本,jquery新版本进行了一些漏洞修复 python-sphinx openEuler-22.03-LTS SP1版本编译构建信息查询链接: https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1 https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1:Epo... openEuler-22.03-LTS SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/ https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version... https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version... https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version... openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 openEuler-22.03-LTS-SP1 I7LW30 【arm】-O3 -flto-partition=one -fipa-struct-reorg -fwhole-program编译ICE:during IPA pass: struct_reorg(in wide_int_to_tree_1, at tree.c:1575) 主要 sig/Compiler gcc openEuler-22.03-LTS-SP1 I7LWCW 【arm】-O3 -flto-partition=one -fipa-struct-reorg -fwhole-program编译ICE:internal compiler error: Segmentation fault 主要 sig/Compiler gcc openEuler-22.03-LTS-SP1 I7LWK7 【arm】-O3 -flto-partition=one -fipa-struct-reorg -fwhole-program编译ICE:during IPA pass: struct_reorg(in get_type_field, at ipa-struct-reorg/ipa-struct-reorg.c:4394) 主要 sig/Compiler gcc openEuler-22.03-LTS-SP1 I7LWO1 【arm】-O3 -flto-partition=one -fipa-struct-reorg -fwhole-program编译ICE:during RTL pass: expand(in convert_move, at expr.c:219) 主要 sig/Compiler gcc openEuler-22.03-LTS-SP1 I7LX07 【arm】-O3 -flto-partition=one -fipa-struct-reorg -fwhole-program编译ICE:during IPA pass: struct_reorg(in get_type_field, at ipa-struct-reorg/ipa-struct-reorg.c:4379) 主要 sig/Compiler gcc openEuler 22.03-SP1 I6B4V1 【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常 主要 sig/bigdata hadoop openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB mariadb openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service php openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 主要 sig/SDS ceph openEuler-22.03-LTS-SP2 Update 20230809 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞23个。目前版本分支剩余待修复缺陷2个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I7QZHC?from=project-is... CVE修复: CVE 仓库 score CVE-2023-29404 golang 9.8 CVE-2023-29405 golang 9.8 CVE-2023-38429 kernel 9.8 CVE-2023-38427 kernel 9.8 CVE-2023-38430 kernel 9.1 CVE-2023-31486 perl-HTTP-Tiny 8.1 CVE-2023-4004 kernel 7.8 CVE-2022-41409 pcre2 7.5 CVE-2023-24607 qt5-qtbase 7.5 CVE-2023-32763 qt5-qtbase 7.5 CVE-2023-2828 bind 7.5 CVE-2023-35945 nghttp2 7.5 CVE-2023-3141 kernel 7.1 CVE-2023-3268 kernel 7.1 CVE-2023-35829 kernel 7.0 CVE-2023-29406 golang 6.5 CVE-2023-25399 scipy 5.5 CVE-2023-38403 iperf3 5.5 CVE-2023-36191 sqlite 5.5 CVE-2023-3648 wireshark 5.5 CVE-2023-32762 qt5-qtbase 5.3 CVE-2023-3817 openssl 5.3 CVE-2023-33201 bouncycastle 2.6 Bugfix: issue 仓库 #I7PDHP: Fix missing dealloc_dfx_cnt() during device unregister kernel #I7KS8E:关于unlock-pidfile-if-current-proccess-is-NOT-dnf.patch的疑问 dnf #I7LPQ9:开启堆栈不可执行链接选项 grub2 #I7QDRI:【22.03 LTS SP2 update20230802】【arm\x86】22.03 SP2版本的ebtables包在22.03 LTS和22.03 SP1的环境上降级有异常打印 ebtables #I7MPVG:更新jQuery版本,jquery新版本进行了一些漏洞修复 python-sphinx openEuler-22.03-LTS SP2版本编译构建信息查询链接: https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP2 https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP2:Epo... openEuler-22.03-LTS SP2 Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/ https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_version... https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_version... openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 主要 sig/sig-CloudNative skopeo openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 主要 sig/sig-AccLib libkae 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天 可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%B... 近14天将超期CVE(8.12日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-39976 I7RFPU 3 9.8 src-openEuler/libqb sig/Computing CVE-2023-37268 I7LBRR 2 8.8 src-openEuler/mysql5 sig/DB CVE-2022-0323 I7Q15A 4 8.8 src-openEuler/php sig/Base-service CVE-2023-29505 I7QQTS 6 8.8 src-openEuler/rubygem-websocket sig/sig-ruby CVE-2023-3896 I7RA2G 10 7.8 src-openEuler/vim sig/Base-service CVE-2023-29458 I7L0C0 0 7.5 src-openEuler/duktape sig/Base-service CVE-2023-37463 I7L1Z0 1 7.5 src-openEuler/cmark sig/GNOME CVE-2023-37276 I7MH0H 7 7.5 src-openEuler/python-aiohttp sig/Programming-lang CVE-2019-9640 I7PDBJ 2 7.5 src-openEuler/php sig/Base-service CVE-2019-9638 I7PDDJ 2 7.5 src-openEuler/php sig/Base-service CVE-2019-9639 I7PDDO 2 7.5 src-openEuler/php sig/Base-service CVE-2019-9637 I7PDHZ 2 7.5 src-openEuler/php sig/Base-service CVE-2023-39978 I7RFP8 10 7.5 src-openEuler/ImageMagick sig/Others CVE-2023-3637 I7NTTG 12 6.5 src-openEuler/openstack-neutron sig/sig-openstack CVE-2022-4304 I7LRB1 4 5.9 src-openEuler/openresty-openssl111 sig/sig-OpenResty CVE-2023-22053 I7M5UJ 6 5.9 src-openEuler/mysql5 sig/DB CVE-2023-22043 I7M5V2 6 5.9 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22053 I7M5V8 6 5.9 src-openEuler/mysql sig/Others CVE-2023-22043 I7M5VN 6 5.9 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22043 I7M5VO 6 5.9 src-openEuler/openjdk-11 sig/Compiler CVE-2023-3782 I7NMHY 12 5.9 src-openEuler/okhttp sig/ai CVE-2023-37732 I7OB3A 14 5.5 src-openEuler/yasm sig/Base-service CVE-2023-22041 I7M5V1 6 5.1 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22041 I7M5VL 6 5.1 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22041 I7M5VM 6 5.1 src-openEuler/openjdk-11 sig/Compiler CVE-2023-22007 I7M5U1 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22056 I7M5UF 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22054 I7M5UR 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22046 I7M5US 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22057 I7M5UV 6 4.9 src-openEuler/mysql sig/Others CVE-2023-21950 I7M5UW 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22008 I7M5V3 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22007 I7M5V4 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22056 I7M5V5 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22054 I7M5VB 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22046 I7M5VC 6 4.9 src-openEuler/mysql sig/Others CVE-2023-22057 I7M5VF 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-21950 I7M5VG 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22008 I7M5VP 6 4.9 src-openEuler/mysql5 sig/DB CVE-2023-22033 I7M5UI 6 4.4 src-openEuler/mysql sig/Others CVE-2023-22005 I7M5UT 6 4.4 src-openEuler/mysql sig/Others CVE-2023-22058 I7M5UY 6 4.4 src-openEuler/mysql5 sig/DB CVE-2023-22033 I7M5V7 6 4.4 src-openEuler/mysql5 sig/DB CVE-2023-22005 I7M5VD 6 4.4 src-openEuler/mysql5 sig/DB CVE-2023-22058 I7M5VI 6 4.4 src-openEuler/mysql sig/Others CVE-2023-3772 I7NYWN 13 4.4 src-openEuler/kernel sig/Kernel CVE-2023-3863 I7NLJR 11 4.1 src-openEuler/kernel sig/Kernel CVE-2023-22036 I7M5UM 6 3.7 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22045 I7M5UU 6 3.7 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22049 I7M5UX 6 3.7 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22044 I7M5UZ 6 3.7 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22036 I7M5V9 6 3.7 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22045 I7M5VE 6 3.7 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22049 I7M5VH 6 3.7 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22044 I7M5VJ 6 3.7 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22036 I7M5VQ 6 3.7 src-openEuler/openjdk-11 sig/Compiler CVE-2023-22045 I7M5VS 6 3.7 src-openEuler/openjdk-11 sig/Compiler CVE-2023-22049 I7M5VT 6 3.7 src-openEuler/openjdk-11 sig/Compiler CVE-2023-22044 I7M5VU 6 3.7 src-openEuler/openjdk-11 sig/Compiler CVE-2023-38496 I7NYZM 13 3.3 src-openEuler/apptainer sig/sig-HPC CVE-2023-22048 I7M5UH 6 3.1 src-openEuler/mysql sig/Others CVE-2023-22006 I7M5V0 6 3.1 src-openEuler/openjdk-latest sig/Compiler CVE-2023-22048 I7M5V6 6 3.1 src-openEuler/mysql5 sig/DB CVE-2023-22006 I7M5VK 6 3.1 src-openEuler/openjdk-1.8.0 sig/Compiler CVE-2023-22006 I7M5VV 6 3.1 src-openEuler/openjdk-11 sig/Compiler CVE-2023-22038 I7M5UQ 6 2.7 src-openEuler/mysql5 sig/DB CVE-2023-22038 I7M5VA 6 2.7 src-openEuler/mysql sig/Others openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范: https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%8... openEuler release-management 版本分支PR指导: https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%8... 社区QA 版本测试提单规范 https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9C... 社区QA 测试平台 radiates https://radiatest.openeuler.orghttps://radiatest.openeuler.org/