发件人:
chemingdao
发送时间: 2022年10月29日
17:53
收件人: 'dev@openeuler.org' <dev@openeuler.org>; 'release@openeuler.org' <release@openeuler.org>; 'qa@openeuler.org' <qa@openeuler.org>; 'sa-announce@openeuler.org' <sa-announce@openeuler.org>
主题: openEuler update_20221031版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG
评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update
20221031发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update
20221031发布情况及待修复缺陷
3、openEuler-22.03-LTS Update
20221031发布情况及待修复缺陷
4、openEuler
关键组件待修复CVE 清单
5、openEuler
社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/11/11)提供
update_20221107版本。
openEuler-20.03-LTS-SP1 Update
20221031
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题6个,已知漏洞13个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLE?from=project-issue
CVE修复:
CVE |
仓库 |
CVSS评分 |
CVE-2022-43680 |
expat |
7.5 |
CVE-2022-32221 |
curl |
4.8 |
CVE-2022-3437 |
samba |
5.9 |
CVE-2022-3621 |
kernel |
7.5 |
CVE-2022-3629 |
kernel |
3.3 |
CVE-2022-3635 |
kernel |
7 |
CVE-2022-3646 |
kernel |
5.3 |
CVE-2022-40768 |
kernel |
5.5 |
CVE-2022-43750 |
kernel |
7.8 |
CVE-2022-3586 |
kernel |
5.5 |
CVE-2022-41973 |
multipath-tools |
7.8 |
CVE-2022-40617 |
strongswan |
6.5 |
CVE-2022-3705 |
vim |
7.5 |
Bugfix:
issue |
仓库 |
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 |
libiscsi |
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation
fault问题 |
libiscsi |
#I5NV0Q:注意spec中changelog撰写规范 |
libiscsi |
#I5OX30:注意spec中changelog撰写规范 |
libiscsi |
#I5X9IO:fix xmtr cannot start in xface4 environment |
mtr |
#I5VVP6:【openEuler-1.0-LTS】uacce增加reference
counter保护 |
kernel |
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
SIG |
I281C1 |
【fuzz】runtime error: |
libsass |
Base-service |
I437CR |
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 |
obs-server |
Others |
I43OSX |
[clamav]
执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 |
clamav |
Others |
I44RHB |
large loop in OBJ_obj2txt |
openssl |
sig-security-facility |
I44RIX |
large loop in bn_lshift_fixed_top |
openssl |
sig-security-facility |
I48GIM |
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 |
ovirt-cockpit-sso |
oVirt |
I490MU |
Uncaught exception in get_tokens_unprocessed |
python-pygments |
Programming-language |
I4CJX9 |
[20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号 |
three-eight-nine-ds-base |
Application |
I4F8YQ |
integer overflow in start_input_bmp |
libjpeg-turbo |
Desktop |
I4F8ZI |
heap-buffer-overflow in get_word_rgb_row |
libjpeg-turbo |
Desktop |
I4F903 |
Unexpect-exit in start_input_tga |
libjpeg-turbo |
Desktop |
I4F913 |
Timeout in tjDecompress2 |
libjpeg-turbo |
Desktop |
I4FRSL |
Undefined-shift in bitset_set |
augeas |
Desktop |
I4FT5J |
Timeout in fa_from_re |
augeas |
Desktop |
I4FT5U |
stack overflow in fa_from_re |
augeas |
Desktop |
I4FT61 |
stack overflow in re_case_expand |
augeas |
Desktop |
I4FT67 |
memleaks in ref_make_ref |
augeas |
Desktop |
I4FT6B |
SEGV in re_case_expand |
augeas |
Desktop |
I4FT6F |
stack overflow in parse_concat_exp |
augeas |
Desktop |
I4FT7B |
stack overflow in calc_eclosure_iter |
augeas |
Desktop |
I4FT8E |
stack overflow in peek_token |
augeas |
Desktop |
I4FT8P |
stack overflow in parse_path_expr |
augeas |
Desktop |
I4FT97 |
Out of memory in ns_from_locpath |
augeas |
Desktop |
I4FT9A |
SEGV in eval_expr |
augeas |
Desktop |
I4FT9C |
SEGV in tree_prev |
augeas |
Desktop |
I4FT9G |
stack overflow in check_expr |
augeas |
Desktop |
I4FT9I |
stack overflow in free_expr |
augeas |
Desktop |
I4G4A5 |
Undefine-shift in _bfd_safe_read_leb128 |
binutils |
Compiler |
I4G4B1 |
Integer overflow in print_vms_time |
binutils |
Compiler |
I4G4VY |
memleak in parse_gnu_debugaltlink |
binutils |
Compiler |
I4G4WF |
Heap-buffer-overflow in slurp_hppa_unwind_table |
binutils |
Compiler |
I4G4WW |
Use-after-free in make_qualified_name |
binutils |
Compiler |
I4G4X6 |
memleak in byte_get_little_endian |
binutils |
Compiler |
I4G4XF |
memleak in process_mips_specific |
binutils |
Compiler |
I4G4Y0 |
out-of-memory in vms_lib_read_index |
binutils |
Compiler |
I4G4YJ |
Heap-buffer-overflow in bfd_getl16 |
binutils |
Compiler |
I4G4YV |
Floating point exception in _bfd_vms_slurp_etir |
binutils |
Compiler |
I4G5TL |
stack-buffer-overflow in redisvFormatCommand |
hiredis |
Base-service |
I4G5U2 |
AddressSanitizer CHECK failed in sdscatvprintf |
hiredis |
Base-service |
I4G5UN |
SEGV in redisvFormatCommand |
hiredis |
Base-service |
I4G5WG |
AddressSanitizer CHECK failed in sdscatlen |
hiredis |
Base-service |
I4G5XO |
Attempting free wild-addr in hi_free |
hiredis |
Base-service |
I4J0OY |
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 |
libdap |
sig-recycle |
I4JMG4 |
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 |
python-robotframework |
sig-ROS |
I4K6ES |
stack-buffer-overflow in UINT32_Marshal
|
libtpms |
sig-security-facility |
I4K6FU |
global-buffer-overflow in Array_Marshal |
libtpms |
sig-security-facility |
I4K6R7 |
memleak in wrap_nettle_mpi_init |
gnutls |
sig-security-facility |
I4K6UI |
Timeout in _asn1_find_up |
gnutls |
sig-security-facility |
I4KT2A |
integer overflow in luaV_execute |
lua |
Base-service |
I4KT3D |
integer overflow in intarith |
lua |
Base-service |
I4KT3Q |
Division by zero in luaV_execute |
lua |
Base-service |
I4KT40 |
Timeout in luaV_finishget |
lua |
Base-service |
I4O16Z |
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 |
kernel |
Kernel |
I4QV6N |
【openEuler-20.03-LTS-SP1】flink命令执行失败
|
flink |
sig-bigdata |
I5G81X |
【20.03 SP1】selinux-policy卸载异常 |
selinux-policy |
sig-security-facility |
I5GT2K |
【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错 |
pcp |
Application |
I5IG1V |
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 |
efl |
sig-compat-winapp |
I5IG6K |
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
opencryptoki |
dev-utils |
I5JHX2 |
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 |
ovirt-engine |
oVirt |
I5JNSL |
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't
open PID file /run/httpd/htcacheclean/pid“ |
httpd |
Networking |
I5Q5D1 |
【20.03 SP1】ibus在sp1分支安装有异常告警 |
ibus |
Desktop |
openEuler-20.03-LTS-SP3 Update
20221031
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题12个,已知漏洞13个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLF?from=project-issue
CVE修复:
需求类型 |
软件包 |
CVSS评分 |
CVE-2022-43680 |
expat |
7.5 |
CVE-2022-32221 |
curl |
4.8 |
CVE-2022-3437 |
samba |
5.9 |
CVE-2022-3621 |
kernel |
7.5 |
CVE-2022-3629 |
kernel |
3.3 |
CVE-2022-3635 |
kernel |
7 |
CVE-2022-3646 |
kernel |
5.3 |
CVE-2022-40768 |
kernel |
5.5 |
CVE-2022-43750 |
kernel |
7.8 |
CVE-2022-3586 |
kernel |
5.5 |
CVE-2022-41973 |
multipath-tools |
7.8 |
CVE-2022-40617 |
strongswan |
6.5 |
CVE-2022-3705 |
vim |
7.5 |
Bugfix:
issue |
仓库 |
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 |
libiscsi |
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation
fault问题 |
libiscsi |
#I5NV0Q:注意spec中changelog撰写规范 |
libiscsi |
#I5OX30:注意spec中changelog撰写规范 |
libiscsi |
#I5Z569:【20.03-sp3_update20221102】在dpvs场景适配内存页读写的控制 |
TCP_option_address |
#I5W3SJ:isulad gc流程加固 |
iSulad |
#I5RHBG:【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错 |
iSulad |
#I5Z59H:【20.03-sp3_update20221102】add required
package lxc lower and upper version |
lcr |
#I5Z58W:【20.03-sp3_update20221102】
add required package lcr lower and upper version |
clibcni |
#I5Z59O:【20.03-sp3_update20221102】update version
to 4.0.3-2022101701 |
lxc |
#I5YHK4:【CRI】kubectl exec由于数据丢失导致失败 |
kubernetes |
#I5VVP6:【openEuler-1.0-LTS】uacce增加reference
counter保护 |
kernel |
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
SIG |
I4QV7S |
【openEuler-20.03-LTS-SP3】flink run
命令执行失败 |
flink |
sig-bigdata |
I4RVHE |
losetup :
当loop设备编号超过7位时,losetup命令无法操作该设备 |
util-linux |
Base-service |
I4UMEV |
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 |
kernel |
Kernel |
I5IGAS |
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
opencryptoki |
dev-utils |
I5IGOR |
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 |
fluidsynth |
Application |
I5JBJ9 |
【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化 |
ovirt-engine |
oVirt |
I5JLNF |
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败 |
ovirt-engine |
oVirt |
I5JLRQ |
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败 |
ovirt-engine |
oVirt |
I5KXUY |
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 |
ovirt-cockpit-sso |
oVirt |
I5KY4S |
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 |
vdsm |
oVirt |
I5LYJK |
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 |
TCP_option_address |
Kernel |
I5PT12 |
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 |
ima-evm-utils |
Base-service |
I5PUIA |
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件 |
qrencode |
Desktop |
I5SCLC |
【20.03 SP3】selinux-policy卸载异常 |
selinux-policy |
sig-security-facility |
openEuler-22.03-LTS Update
20221031
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞34个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLG?from=project-issue
CVE修复:
CVE |
仓库 |
CVSS评分 |
CVE-2022-40617 |
strongswan |
6.5 |
CVE-2022-43680 |
expat |
7.5 |
CVE-2022-41973 |
multipath-tools |
7.8 |
CVE-2022-3705 |
vim |
7.5 |
CVE-2022-42915 |
curl |
7.3 |
CVE-2022-32221 |
curl |
4.8 |
CVE-2022-42916 |
curl |
5.3 |
CVE-2022-3437 |
samba |
5.9 |
CVE-2021-37616 |
exiv2 |
5.5 |
CVE-2021-37615 |
exiv2 |
5.5 |
CVE-2021-32815 |
exiv2 |
5.5 |
CVE-2021-37623 |
exiv2 |
5.5 |
CVE-2021-37622 |
exiv2 |
5.5 |
CVE-2021-34334 |
exiv2 |
5.5 |
CVE-2021-37620 |
exiv2 |
5.5 |
CVE-2021-37621 |
exiv2 |
5.5 |
CVE-2021-37619 |
exiv2 |
5.5 |
CVE-2021-34335 |
exiv2 |
5.5 |
CVE-2021-37618 |
exiv2 |
5.5 |
CVE-2021-31292 |
exiv2 |
7.5 |
CVE-2019-13108 |
exiv2 |
6.5 |
CVE-2019-13504 |
exiv2 |
6.5 |
CVE-2022-2978 |
kernel |
7.8 |
CVE-2022-3523 |
kernel |
5.3 |
CVE-2022-3535 |
kernel |
3.5 |
CVE-2022-3625 |
kernel |
7.8 |
CVE-2022-3629 |
kernel |
3.3 |
CVE-2022-3621 |
kernel |
7.5 |
CVE-2022-3623 |
kernel |
7.5 |
CVE-2022-42432 |
kernel |
1 |
CVE-2022-3646 |
kernel |
5.3 |
CVE-2022-3635 |
kernel |
7 |
CVE-2022-43750 |
kernel |
7.8 |
CVE-2022-3628 |
kernel |
1 |
Bugfix:
issue |
仓库 |
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同 |
libiscsi |
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation
fault问题 |
libiscsi |
#I5NV0Q:注意spec中changelog撰写规范 |
libiscsi |
#I5OX30:注意spec中changelog撰写规范 |
libiscsi |
#I5JNRY:remove dependency of nss-help for nss and nss-util |
nss |
#I5S7HX:增加spec文件中Provides和Obsoletes字段的版本号信息 |
sssd |
#I5R5G9:在spec文件中,为SMx算法添加provides字段 |
openssl |
#I5SCWP:需要提供libgcrypt-sm3 |
libgcrypt |
#I5OBVF:例行分析anaconda、grub2、libdnf软件包补丁 |
libdnf |
#I5TQV5:
开源软件包openssh社区补丁回合 |
openssh |
#I5YQKC:
并发执行isula-build时kill daemon,/var/lib/isula-build/storage/overlay目录存在残留 |
isula-build |
#I5OMXK:openEuler 22.03 LTS update版本发布yocto-pseudo |
yocto-pseudo |
#I5Z5BQ:fix no /dev/isgx on non-FLC platforms with 5.10 kernel |
linux-sgx-driver |
#I5Y13K:bunzip2 -L/-V和bzcat -L/-V查询信息打印异常且返回值不为0 |
bzip2 |
#I5RZPQ:bzip2提供的so版本不唯一 |
bzip2 |
#I5YRAC:【OLK-5.10】scsi: sd: Revert "scsi:
sd: Remove a local variable" |
kernel |
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Train/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Wallaby/
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
SIG |
I5G9CY |
升级iinstall-scripts包会导致系统启动异常 |
install-scripts |
sig-OS-Builder |
I5JIA6 |
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 |
ovirt-engine |
oVirt |
I5JPII |
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin |
ovirt-engine |
oVirt |
I5LKKX |
libbluray build problem in openEuler:22.03:LTS |
libbluray |
Desktop |
I5LKM6 |
libxshmfence build problem in openEuler:22.03:LTS |
libxshmfence |
Desktop |
I5LKY8 |
yaffs2 build problem in openEuler:22.03:LTS |
yaffs2 |
sig-embedded |
I5QKGT |
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 |
kmod-drbd90 |
sig-Ha |
I5RHYO |
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启 |
pkgship |
sig-EasyLife |
I5Q4S3 |
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 |
kernel |
Kernel |
I5TMFF |
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败 |
mariadb |
DB |
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG
关注涉及CVE组件的修复情况。
严重等级(Severity Rating) |
漏洞修复时长 |
致命(Critical) |
7天 |
高(High) |
14天 |
中(Medium) |
30天 |
低(Low) |
30天 |
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%BC%8F%E6%B4%9E%E7%AE%A1%E7%90%86
近14天将超期CVE:
漏洞编号 |
Issue ID |
剩余天数 |
CVSS评分 |
软件包 |
SIG |
CVE-2022-3424 |
I5UBUG |
1 |
|
risc-v-kernel |
sig-RISC-V |
CVE-2022-3577 |
I5X9E0 |
1.46 |
7.8 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3435 |
I5UJIG |
1.99 |
4.3 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-42703 |
I5USP2 |
3.5 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-43750 |
I5XTUC |
3.7 |
7.8 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3654 |
I5XWK1 |
3.85 |
8.8 |
chromium |
Application |
CVE-2022-3652 |
I5XWJV |
3.85 |
8.8 |
chromium |
Application |
CVE-2022-3656 |
I5XWJT |
3.85 |
8.8 |
chromium |
Application |
CVE-2022-3658 |
I5XWJR |
3.85 |
8.8 |
chromium |
Application |
CVE-2022-3657 |
I5XWQK |
3.88 |
8.8 |
chromium |
Application |
CVE-2022-3655 |
I5XWQJ |
3.88 |
8.8 |
chromium |
Application |
CVE-2022-3659 |
I5XWY2 |
3.92 |
8.8 |
chromium |
Application |
CVE-2022-3653 |
I5XWXZ |
3.92 |
8.8 |
chromium |
Application |
CVE-2022-3697 |
I5XXE0 |
4.08 |
7.5 |
ansible |
dev-utils |
CVE-2022-34169 |
I5HV9H |
4.37 |
7.5 |
openjdk-1.8.0 |
Compiler |
CVE-2022-39286 |
I5Y50E |
4.97 |
8.8 |
python-jupyter-core |
|
CVE-2022-3725 |
I5Y58X |
5.08 |
7.5 |
wireshark |
Application |
CVE-2022-3466 |
I5VEVL |
5.99 |
|
cri-o |
sig-CloudNative |
CVE-2022-3723 |
I5YENW |
6.88 |
8.8 |
chromium |
Application |
CVE-2022-42721 |
I5VM7S |
6.88 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-42722 |
I5VMMV |
6.99 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3757 |
I5YF3B |
7.14 |
8.8 |
exiv2 |
Desktop |
CVE-2022-3756 |
I5YF3M |
7.17 |
8.8 |
exiv2 |
Desktop |
CVE-2022-2741 |
I5YPB2 |
9.15 |
7.5 |
zephyr |
|
CVE-2022-42252 |
I5YPBQ |
9.2 |
7.5 |
tomcat |
Application |
CVE-2022-41974 |
I5XJYL |
9.41 |
7.8 |
multipath-tools |
Storage |
CVE-2022-3523 |
I5VZ0L |
10.37 |
5.3 |
kernel |
Kernel |
CVE-2021-32785 |
I5Z074 |
10.52 |
7.5 |
httpd |
Networking |
CVE-2022-40304 |
I5W79V |
10.98 |
|
libxml2 |
Base-service |
CVE-2022-40303 |
I5W79R |
10.98 |
|
libxml2 |
Base-service |
CVE-2022-3544 |
I5W7BX |
10.99 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3543 |
I5W7BW |
10.99 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3542 |
I5W7BT |
10.99 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3535 |
I5W7BQ |
10.99 |
3.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3531 |
I5W7BL |
10.99 |
5.7 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3532 |
I5W7BF |
10.99 |
5.7 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3542 |
I5W7B1 |
10.99 |
5.5 |
kernel |
Kernel |
CVE-2022-3533 |
I5W7AV |
10.99 |
5.7 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3563 |
I5W7ZQ |
11.43 |
5.7 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3563 |
I5W7YB |
11.43 |
5.7 |
kernel |
Kernel |
CVE-2022-43995 |
I5Z7XW |
11.51 |
7.1 |
sudo |
Base-service |
CVE-2022-38791 |
I5WD41 |
11.73 |
5.5 |
mariadb |
DB |
CVE-2022-44638 |
I5ZCPG |
11.86 |
8.8 |
pixman |
Desktop |
CVE-2022-3586 |
I5WF1J |
11.9 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-2602 |
I5WFKI |
12.3 |
6.5 |
kernel |
Kernel |
CVE-2022-3595 |
I5WFKO |
12.31 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3595 |
I5WFKN |
12.31 |
5.5 |
kernel |
Kernel |
CVE-2022-21589 |
I5WFL3 |
12.34 |
4.3 |
mysql5 |
DB |
CVE-2022-21608 |
I5WFL5 |
12.35 |
4.9 |
mysql5 |
DB |
CVE-2022-21592 |
I5WFL9 |
12.36 |
4.3 |
mysql5 |
DB |
CVE-2022-21617 |
I5WFLE |
12.37 |
4.9 |
mysql5 |
DB |
CVE-2022-32287 |
I5ZEF8 |
12.45 |
7.5 |
lucene4 |
sig-Java |
CVE-2018-20657 |
I5WL3H |
12.73 |
|
binutils |
Compiler |
CVE-2022-3606 |
I5WLYF |
12.77 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3606 |
I5WLXN |
12.77 |
5.5 |
kernel |
Kernel |
CVE-2022-21624 |
I5WMVR |
12.84 |
3.7 |
openjdk-latest |
Compiler |
CVE-2022-21619 |
I5WMVP |
12.84 |
3.7 |
openjdk-latest |
Compiler |
CVE-2022-21624 |
I5WMVM |
12.84 |
3.7 |
openjdk-11 |
Compiler |
CVE-2022-21626 |
I5WMU2 |
12.84 |
5.3 |
openjdk-latest |
Compiler |
CVE-2022-21626 |
I5WMTY |
12.84 |
5.3 |
openjdk-11 |
Compiler |
CVE-2022-39399 |
I5WMYV |
12.85 |
3.7 |
openjdk-11 |
Compiler |
CVE-2022-39399 |
I5WMYG |
12.85 |
3.7 |
openjdk-latest |
Compiler |
CVE-2022-21628 |
I5WMYC |
12.85 |
5.3 |
openjdk-latest |
Compiler |
CVE-2022-21628 |
I5WMY2 |
12.85 |
5.3 |
openjdk-11 |
Compiler |
CVE-2022-21597 |
I5WMXW |
12.85 |
5.3 |
openjdk-11 |
Compiler |
CVE-2022-21618 |
I5WMXA |
12.85 |
5.3 |
openjdk-latest |
Compiler |
CVE-2022-21618 |
I5WMX4 |
12.85 |
5.3 |
openjdk-11 |
Compiler |
CVE-2012-6136 |
I5WMWP |
12.85 |
5.5 |
tuned |
Computing |
CVE-2017-11552 |
I5WMZS |
12.86 |
6.5 |
libmad |
Others |
CVE-2018-17828 |
I5WN2X |
12.87 |
5.5 |
zziplib |
Base-service |
CVE-2018-16548 |
I5WN1L |
12.87 |
6.5 |
zziplib |
Base-service |
CVE-2022-21619 |
I5WN4Q |
12.88 |
3.7 |
openjdk-11 |
Compiler |
CVE-2022-35717 |
I5ZL1K |
13.14 |
7.8 |
kernel |
Kernel |
CVE-2022-42928 |
I5WR2P |
13.65 |
|
firefox |
Application |
CVE-2022-3624 |
I5WYKS |
14.64 |
3.3 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3630 |
I5WYKI |
14.64 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3629 |
I5WYLP |
14.65 |
3.3 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3629 |
I5WYLL |
14.65 |
3.3 |
kernel |
Kernel |
CVE-2022-3619 |
I5X0EY |
14.74 |
4.3 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-3619 |
I5X0E3 |
14.74 |
4.3 |
kernel |
Kernel |
CVE-2022-42432 |
I5X2IL |
14.98 |
|
risc-v-kernel |
sig-RISC-V |
openEuler
社区指导文档及开放平台链接:
openEuler
版本分支维护规范:
openEuler release-management
版本分支PR指导:
社区QA
版本测试提单规范
社区QA
测试平台 radiates
https://radiatest.openeuler.org
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail:
chemingdao@huawei.com
Open
Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it