mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
List overview
Download
Sa-announce
March 2023
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
sa-announce@openeuler.org
1 participants
4 discussions
Start a n
N
ew thread
openEuler update_20230322版本发布公告
by muyuying
26 Mar '23
26 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230322发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230322发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230322发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/04/02)提供 update_ 20230329 版本。 openEuler-20.03-LTS-SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCM?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6O19D 【20.03 sp1 udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-20.03-LTS-SP3 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞5个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCO?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-27337 poppler 6.5 CVE-2023-1073 kernel 6.3 CVE-2023-1095 kernel 5.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6P8R2:udpate-20230322 json-c:enable DT json-c #I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task kernel #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞2个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCP?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 Bugfix: issue 仓库 #I6DM2X:兼容-accel参数 stratovirt #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I5YM6P:openEuler 22.03 LTS Next版本python-chardet软件升级至5.0.0 python-chardet #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask<
https://gitee.com/open_euler/dashboard?issue_id=I6NVPT
> kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby openEuler-22.03-LTS SP1 Update 20230322 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞5个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCL?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-27337 poppler 6.5 CVE-2023-1264 vim 5.5 CVE-2023-1074 kernel 4.7 CVE-2023-1079 kernel 6.8 CVE-2023-1382 kernel 0 Bugfix: issue 仓库 #I6P9BJ:update20230322-update iputils to version 20221126 iputils #I6DM2X:兼容-accel参数 stratovirt #I6ORHV:【22.03_LTS_SP1】jemalloc版本需要从5.2.1升级到5.3.0 jemalloc #I6NY9Y:22.03-openEuler-LTS-SP1升级zbar,通过升级合入上游社区修复的一系列问题 zbar #I6OFGK:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败 pam #I6P8V4:update20230322 Minor fix in the compatibility library gdbm #I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 sig I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2022-48423 I6OD4U 1.61 9.8 kernel Kernel CVE-2021-3329 I6HUIN 3.0 6.5 zephyr CVE-2023-1076 I6I7UH 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 4.37 4.7 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U8 4.37 0.0 risc-v-kernel sig-RISC-V CVE-2023-20860 I6PDX0 4.6 9.1 springframework sig-Java CVE-2023-28466 I6NIUR 4.61 7.0 kernel Kernel CVE-2023-28466 I6NIUL 4.61 7.0 risc-v-kernel sig-RISC-V CVE-2023-27781 I6NIU2 4.61 7.8 jpegoptim Application CVE-2023-1095 I6IK9V 5.25 5.5 risc-v-kernel sig-RISC-V CVE-2023-1018 I6IKCI 5.5 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 5.52 5.9 firefox Application CVE-2023-22997 I6IKXC 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 5.6 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 5.6 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 5.6 5.5 kernel Kernel CVE-2023-22998 I6IKWF 5.6 5.5 kernel Kernel CVE-2023-22999 I6IKXV 5.61 5.5 risc-v-kernel sig-RISC-V CVE-2023-25155 I6IRPL 5.87 6.5 redis Others CVE-2023-25155 I6IRP9 5.87 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 5.87 6.5 redis5 sig-bigdata CVE-2022-36021 I6IRS4 5.88 5.5 redis Others CVE-2022-36021 I6IRRY 5.88 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 5.88 5.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 5.92 0.0 edk2 Virt CVE-2019-14561 I6ISWY 5.92 0.0 edk2 Virt CVE-2023-22462 I6ITUB 5.95 5.4 grafana Application CVE-2023-27594 I6O472 6.19 7.3 cilium sig-high-performance-network CVE-2023-0594 I6IVYK 6.25 5.4 grafana Application CVE-2023-0507 I6IVYI 6.25 5.4 grafana Application CVE-2023-23004 I6IXRY 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 6.65 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 6.65 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 6.65 5.5 kernel Kernel CVE-2023-23002 I6IXOH 6.65 5.5 kernel Kernel CVE-2023-23005 I6IXO8 6.65 5.5 kernel Kernel CVE-2023-23001 I6IXNW 6.65 5.5 kernel Kernel CVE-2023-1161 I6JJJE 8.25 6.5 wireshark Application CVE-2022-48425 I6OD5R 8.61 7.8 kernel Kernel CVE-2022-48424 I6OD4P 8.61 7.8 kernel Kernel CVE-2023-1281 I6OP9S 9.51 7.8 kernel Kernel CVE-2023-27586 I6OW3B 9.87 7.1 python-cairosvg CVE-2022-41725 I6OXZH 9.93 7.5 golang sig-golang CVE-2022-41724 I6OXZB 9.93 7.5 golang sig-golang CVE-2022-41723 I6OXYJ 9.93 7.5 golang sig-golang CVE-2019-10358 I6K7LN 10.87 6.5 maven2 sig-Java CVE-2017-1000397 I6K7IR 10.87 5.9 maven2 sig-Java CVE-2023-1194 I6KDP0 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1195 I6KDOZ 11.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDQD 11.13 0.0 risc-v-kernel sig-RISC-V CVE-2023-1192 I6KDP1 11.13 0.0 kernel Kernel CVE-2023-1193 I6KEWP 11.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1193 I6KEWO 11.25 6.5 kernel Kernel CVE-2023-1249 I6KT9F 12.12 0.0 risc-v-kernel sig-RISC-V CVE-2023-1249 I6KT9C 12.12 4.1 kernel Kernel CVE-2023-1252 I6KTT3 12.25 0.0 risc-v-kernel sig-RISC-V CVE-2023-1108 I6KVMO 12.63 0.0 undertow sig-Java CVE-2023-27478 I6KWN7 12.66 6.5 libmemcached Programming-language CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler update_20230315版本发布公告
by muyuying
19 Mar '23
19 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。 openEuler-20.03-LTS-SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-40899 future 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-27320 sudo 1 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-38751 snakeyaml 6.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本 python-paramiko #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-26081 epiphany 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-27320 sudo 1 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-3560 pesign 5.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-26607 kernel 7.1 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-1175 vim 7.3 CVE-2023-1170 vim 7.8 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-40899 future 7.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6J86M:repo python-lit-15.0.7-1源码包 python-lit #I6K0AO:gala-gopher升级到1.0.2版本 gala-gopher #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6MR9A:例行回合社区补丁 efibootmgr #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxx #I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxxabi #I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 llvm-libunwind openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.19日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-0662 I6FWA8 0.13 5.3 php Base-service CVE-2023-0567 I6FXSZ 0.2 6.2 php Base-service CVE-2019-17003 I6FZ58 0.45 6.1 thunderbird sig-desktop-apps CVE-2023-23039 I6H8H5 6.02 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 6.02 5.5 freeimage dev-utils CVE-2023-26464 I6MI3U 7.87 7.5 log4j12 Application CVE-2021-3329 I6HUIN 9.2 6.5 zephyr CVE-2023-1055 I6I76Q 10.33 5.5 three-eight-nine-ds-base Application CVE-2023-1076 I6I7UH 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7U9 10.58 6.8 kernel Kernel CVE-2023-1075 I6I7U8 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U2 10.58 2.5 kernel Kernel CVE-2023-24533 I6LIQ9 10.8 7.5 golang sig-golang CVE-2023-27781 I6NIU2 10.81 7.8 jpegoptim Application CVE-2023-1073 I6IFV4 11.12 6.3 kernel Kernel CVE-2023-1095 I6IK9V 11.45 5.5 risc-v-kernel sig-RISC-V CVE-2023-1095 I6IK9U 11.45 5.5 kernel Kernel CVE-2023-1018 I6IKCI 11.7 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 11.72 5.9 firefox Application CVE-2023-22999 I6IKXV 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKXC 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 11.81 5.5 kernel Kernel CVE-2023-22998 I6IKWF 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWB 11.81 5.5 kernel Kernel CVE-2022-36021 I6IRS4 12.08 5.5 redis Others CVE-2022-36021 I6IRRY 12.08 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 12.08 5.5 redis5 sig-bigdata CVE-2023-25155 I6IRPL 12.08 6.5 redis Others CVE-2023-25155 I6IRP9 12.08 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 12.08 6.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 12.12 0.0 edk2 Virt CVE-2019-14561 I6ISWY 12.12 0.0 edk2 Virt CVE-2023-22462 I6ITUB 12.16 5.4 grafana Application CVE-2023-0594 I6IVYK 12.45 5.4 grafana Application CVE-2023-0507 I6IVYI 12.45 5.4 grafana Application CVE-2023-23004 I6IXRY 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 12.85 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 12.85 5.5 kernel Kernel CVE-2023-23002 I6IXOH 12.85 5.5 kernel Kernel CVE-2023-23005 I6IXO8 12.85 5.5 kernel Kernel CVE-2023-23001 I6IXNW 12.85 5.5 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel CVE-2023-1161 I6JJJE 14.45 6.5 wireshark Application openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler update_20230308版本发布公告
by muyuying
12 Mar '23
12 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230308发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230308发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230308发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230308发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/19)提供 update_ 20230315 版本。 openEuler-20.03-LTS-SP1 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷36个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVB?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-0461 kernel 1 CVE-2023-1073 kernel 1 CVE-2023-1076 kernel 1 CVE-2023-1078 kernel 1 CVE-2023-1095 kernel 1 CVE-2023-1118 kernel 1 CVE-2023-23000 kernel 1 CVE-2023-26607 kernel 7.1 Bugfix: issue 仓库 #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages() kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞12个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVC?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2020-10775 ovirt-engine 5.3 CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-0461 kernel 1 CVE-2023-1073 kernel 1 CVE-2023-1076 kernel 1 CVE-2023-1078 kernel 1 CVE-2023-1095 kernel 1 CVE-2023-1118 kernel 1 CVE-2023-23000 kernel 1 CVE-2023-26607 kernel 7.1 Bugfix: issue 仓库 #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages() kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230308 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞4个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVD?from=project-i…
CVE修复: CVE 仓库 score CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2023-24998 apache-commons-fileupload 7.5 CVE-2023-23009 libreswan 7.5 Bugfix: issue 仓库 #I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息 unbound #I6L1MK:update_20230308 fix ipnetns attach failed iproute #I6L25Z:update_20230308 Multi-Version_OpenStack-Wallaby_openEuler-22.03-LTS分支修复openstack依赖问题 python-chardet openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230308 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷21个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVA?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-22796 rubygem-activesupport 7.5 CVE-2022-37705 amanda 6.7 CVE-2022-37704 amanda 6.7 CVE-2022-3560 pesign 5.5 CVE-2023-0240 kernel 7.8 CVE-2023-0615 kernel 5.5 CVE-2023-0045 kernel 5.1 CVE-2023-20938 kernel 8.8 CVE-2023-23586 kernel 5.5 CVE-2022-47629 libksba 9.8 CVE-2023-23009 libreswan 7.5 CVE-2023-24998 apache-commons-fileupload 7.5 Bugfix: issue 仓库 #I6IQTA:openldap开启build_cross宏支持交叉编译 openldap #I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息 unbound #I6L1MK:update_20230308 fix ipnetns attach failed iproute openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I657VS 【22.03_LTS_SP1_RC2】【x86/arm】dde-api不存在安全的编译选项PIE、STRIP dde-api sig-DDE I657VT 【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP dde-daemon sig-DDE I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I657W7 【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP deepin-system-monitor sig-DDE I6583U 【22.03_LTS_SP1_RC2】【x86/arm】startdde不存在安全的编译选项PIE、STRIP startdde sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-26607 I6HWPB 0.64 7.1 risc-v-kernel sig-RISC-V CVE-2023-26605 I6HWOX 0.64 7.8 risc-v-kernel sig-RISC-V CVE-2023-26606 I6HWOO 0.64 7.8 risc-v-kernel sig-RISC-V CVE-2023-1077 I6I7UG 1.39 7.0 risc-v-kernel sig-RISC-V CVE-2023-22995 I6IEHV 1.89 7.8 risc-v-kernel sig-RISC-V CVE-2023-22995 I6IEH4 1.89 7.8 kernel Kernel CVE-2022-41723 I6IKBL 2.35 7.5 perl-Net-HTTP Programming-language CVE-2023-27371 I6IKCF 2.51 7.5 libmicrohttpd Application CVE-2023-1017 I6IUP1 3.01 7.8 libtpms sig-security-facility CVE-2022-25937 I6EUG8 3.1 6.5 openstack-glance sig-openstack CVE-2023-1118 I6IW01 3.53 7.8 kernel Kernel CVE-2023-23003 I6IXRI 3.66 7.8 risc-v-kernel sig-RISC-V CVE-2023-23003 I6IXPB 3.66 7.8 kernel Kernel CVE-2023-25730 I6F4RP 4.41 0.0 firefox Application CVE-2023-25739 I6F4RO 4.41 0.0 firefox Application CVE-2023-25736 I6F4RN 4.41 0.0 firefox Application CVE-2023-25738 I6F4RM 4.41 0.0 firefox Application CVE-2023-25731 I6F4RL 4.41 0.0 firefox Application CVE-2023-25735 I6F4RK 4.41 0.0 firefox Application CVE-2023-25740 I6F4RJ 4.41 0.0 firefox Application CVE-2023-25744 I6F4RI 4.41 0.0 firefox Application CVE-2023-25746 I6F4RH 4.41 0.0 firefox Application CVE-2023-25742 I6F4RG 4.41 0.0 firefox Application CVE-2023-25728 I6F4RF 4.41 0.0 firefox Application CVE-2023-25737 I6F4RE 4.41 0.0 firefox Application CVE-2023-25734 I6F4RD 4.41 0.0 firefox Application CVE-2023-25745 I6F4RA 4.41 0.0 firefox Application CVE-2023-25743 I6F4R8 4.41 0.0 firefox Application CVE-2023-25741 I6F4R6 4.41 0.0 firefox Application CVE-2023-25729 I6F4R2 4.41 0.0 firefox Application CVE-2023-25732 I6F4QX 4.41 0.0 firefox Application CVE-2023-25733 I6F4QT 4.41 0.0 firefox Application CVE-2023-0767 I6F4QN 4.41 0.0 firefox Application CVE-2022-27672 I6FB6C 4.91 4.7 kernel Kernel CVE-2022-38090 I6FDF4 5.03 4.4 microcode_ctl System-tool CVE-2022-33196 I6FDF2 5.03 6.7 microcode_ctl System-tool CVE-2023-23934 I6FDE3 5.03 3.5 python-werkzeug Programming-language CVE-2023-23918 I6GFMC 5.23 7.5 nodejs sig-nodejs CVE-2023-0778 I6FEKK 5.28 0.0 podman sig-CloudNative CVE-2016-3092 I6JLSA 5.72 7.5 struts sig-Java CVE-2023-20052 I6FMJU 5.95 0.0 clamav Others CVE-2023-0616 I6FOOO 6.14 0.0 thunderbird sig-desktop-apps CVE-2023-0662 I6FWA8 6.94 5.3 php Base-service CVE-2023-0567 I6FXSZ 7.01 0.0 php Base-service CVE-2023-23586 I6FYP9 7.14 5.5 kernel Kernel CVE-2019-17003 I6FZ58 7.26 6.1 thunderbird sig-desktop-apps CVE-2019-17003 I6FZ57 7.26 6.1 mozjs78 Desktop CVE-2019-17003 I6FZ56 7.26 6.1 firefox Application CVE-2023-26604 I6JZ81 7.63 7.8 systemd Base-service CVE-2022-36397 I6FZ5I 8.61 7.8 kernel Kernel CVE-2023-1220 I6KVOV 9.64 8.8 chromium Application CVE-2023-1227 I6KVOD 9.64 8.8 chromium Application CVE-2023-1219 I6KVLQ 9.64 8.8 chromium Application CVE-2023-1218 I6KVL8 9.64 8.8 chromium Application CVE-2023-1216 I6KVKV 9.64 8.8 chromium Application CVE-2023-1213 I6KYB7 9.76 8.8 chromium Application CVE-2023-1214 I6KYB6 9.76 8.8 chromium Application CVE-2023-23920 I6GGBS 10.08 4.2 nodejs sig-nodejs CVE-2021-33639 I6H235 12.02 0.0 risc-v-kernel sig-RISC-V CVE-2023-23039 I6H8HC 12.83 5.7 kernel Kernel CVE-2023-23039 I6H8H5 12.83 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 12.83 5.5 freeimage dev-utils openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95511.7855BC70]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler update_20230301版本发布公告
by muyuying
05 Mar '23
05 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230301发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230301发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230301发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230301发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/11)提供 update_ 20230308 版本。 openEuler-20.03-LTS-SP1 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题5个,已知漏洞24个。目前版本分支剩余待修复缺陷43个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKH?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-26545 kernel 5.3 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合<
https://gitee.com/open_euler/dashboard?issue_id=I6E9JM
> python-urllib3 #I6AA06:【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”<
https://gitee.com/open_euler/dashboard?issue_id=I6AA06
> sos #I63KFX:自动化测试FC卡不显示FC卡的型号信息<
https://gitee.com/open_euler/dashboard?issue_id=I63KFX
> oec-hardware #I4RU21:回合社区补丁<
https://gitee.com/open_euler/dashboard?issue_id=I4RU21
> dnf-plugins-core #I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测<
https://gitee.com/open_euler/dashboard?issue_id=I6BO2R
> kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6IU04 【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败 amanda Application I6IU77 【update20230228-22.03-lts-sp1】amaespipe命令执行失败 amanda Application openEuler-20.03-LTS-SP3 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞23个。目前版本分支剩余待修复缺陷 14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKI?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-26545 kernel 5.3 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I4RADS:【20.03-LTS-SP1】log4j升级失败 log4j #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I4RU21:回合社区补丁 dnf-plugins-core #I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6ITY0 【update20230228-20.03-lts-sp3】amcrypt-ossl 命令执行失败 amanda Application I6IUAO 【update20230228-20.03-lts-sp3】amaespipe命令执行失败 amanda Application openEuler-22.03-LTS Update 20230301 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞29个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKJ?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-22796 rubygem-activesupport 7.5 CVE-2022-44566 rubygem-activerecord 7.5 CVE-2023-22794 rubygem-activerecord 8.8 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2023-26081 epiphany 0 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-0597 kernel 5.5 CVE-2023-0615 kernel 5.5 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-44789 mujs 8.8 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题 unbound #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I57PCI:python3-dnf-plugin-post-transaction-actions子包缺少目录 dnf-plugins-core #I6IRK0:update_0301 避免全量升级出现文件冲突 cups openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6IU0H 【update20230228-22.03-lts】amcrypt-ossl 命令执行失败 amanda Application I6IU1P 【update20230228-22.03-lts】amaespipe命令执行失败 amanda Application openEuler-22.03-LTS SP1 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞24个。目前版本分支剩余待修复缺陷23个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKG?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2022-44566 rubygem-activerecord 7.5 CVE-2023-22794 rubygem-activerecord 8.8 CVE-2023-24580 python-django 7.5 CVE-2022-3560 pesign 5.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2022-44789 mujs 8.8 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6FF6H:glib2社区补丁回合 glib2 #I6CA2Y:update_20230201-修复glib2-static安装时找不到sysprof-capture-static安装依赖 sysprof #I6HRK9:删除.a库文件并添加make依赖 c-ares #I6HL17:samba 22.03-LTS-SP1升级 samba #I6CGPC:verdor.obscpio文件包缺少stringio-3.0.1.gem obs-bundled-gems #I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题 unbound #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I6IRWV:update-0301 fix update conflict of devel and help cups #I6IS21:update-0301 disable static library libXxf86vm #I6GJ7I:安装摘要信息引导界面--root密码输入框,密码输入框眼睛图标含义未汉化 anaconda #I5WLDC:Upgrade to latest release [dnf-plugins-core: 4.0.24 -> 4.3.1] dnf-plugins-core #I6I9HY:delete static library libtirpc #I6IAVJ:delete static library ipset #I6IBB9:delete static library nghttp2 #I6IBLQ:delete static library libdnet #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I657VS 【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP dde-api sig-DDE I657VT 【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP dde-daemon sig-DDE I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I657W7 【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP deepin-system-monitor sig-DDE I6583U 【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP startdde sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6IU04 【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败 amanda Application I6IU77 【update20230228-22.03-lts-sp1】amaespipe命令执行失败 amanda Application 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-23919 I6GFMF 1.26 7.5 nodejs sig-nodejs CVE-2023-23918 I6GFMC 1.26 7.5 nodejs sig-nodejs CVE-2023-24998 I6GH6P 1.55 7.5 apache-commons-fileupload dev-utils CVE-2023-26242 I6GMYX 2.11 7.8 risc-v-kernel sig-RISC-V CVE-2022-48340 I6GQAI 2.26 7.5 glusterfs Storage CVE-2023-23009 I6GTCD 2.91 7.5 libreswan System-tool CVE-2023-26314 I6GYV6 3.14 8.8 mono Base-service CVE-2022-4384 I6DBAC 3.84 6.5 stream CVE-2023-25586 I6DKU7 4.66 0.0 mingw-binutils sig-compat-winapp CVE-2023-25586 I6DKU4 4.66 0.0 binutils Compiler CVE-2022-4304 I6DKV8 4.68 5.9 edk2 Virt CVE-2022-4203 I6DKUZ 4.68 0.0 compat-openssl11 CVE-2023-25585 I6DKUW 4.68 0.0 mingw-binutils sig-compat-winapp CVE-2023-25587 I6DKUV 4.68 0.0 mingw-binutils sig-compat-winapp CVE-2022-4203 I6DKUU 4.68 0.0 edk2 Virt CVE-2023-25585 I6DKUP 4.68 0.0 binutils Compiler CVE-2023-25587 I6DKUO 4.68 0.0 binutils Compiler CVE-2022-4304 I6DKUI 4.68 5.9 compat-openssl11 CVE-2023-25584 I6DSPJ 5.26 0.0 binutils Compiler CVE-2023-25588 I6DSPH 5.26 0.0 mingw-binutils sig-compat-winapp CVE-2023-25584 I6DSPB 5.26 0.0 mingw-binutils sig-compat-winapp CVE-2023-25588 I6DSP8 5.26 0.0 binutils Compiler CVE-2023-21864 I6DZ7V 6.11 4.9 mysql Others CVE-2023-21870 I6DZ7O 6.11 4.9 mysql Others CVE-2023-21866 I6DZ7K 6.11 4.9 mysql Others CVE-2023-21874 I6DZ7A 6.11 2.7 mysql Others CVE-2023-21868 I6DZ76 6.11 6.5 mysql Others CVE-2023-21863 I6DZ6V 6.11 4.9 mysql Others CVE-2023-21869 I6DZ6M 6.11 5.5 mysql Others CVE-2023-21836 I6DZ9K 6.12 4.9 mysql Others CVE-2023-21871 I6DZ99 6.12 4.9 mysql Others CVE-2023-21865 I6DZ8X 6.12 4.9 mysql Others CVE-2023-21872 I6DZ8C 6.12 5.5 mysql Others CVE-2023-21867 I6DZ84 6.12 4.9 mysql Others CVE-2023-21873 I6DZ7Z 6.12 4.9 mysql Others CVE-2023-25166 I6E2G8 6.26 6.5 python-odo sig-python-modules CVE-2022-41862 I6E3MO 6.51 0.0 postgresql DB CVE-2023-20938 I6DKVG 8.15 8.8 kernel Kernel CVE-2023-1077 I6I7UG 8.64 7.0 risc-v-kernel sig-RISC-V CVE-2023-1077 I6I7UB 8.64 7.0 kernel Kernel CVE-2022-25937 I6EUG8 10.35 6.5 openstack-glance sig-openstack CVE-2023-0767 I6F4QN 11.65 0.0 firefox Application CVE-2023-25730 I6F4RP 11.66 0.0 firefox Application CVE-2023-25739 I6F4RO 11.66 0.0 firefox Application CVE-2023-25736 I6F4RN 11.66 0.0 firefox Application CVE-2023-25738 I6F4RM 11.66 0.0 firefox Application CVE-2023-25731 I6F4RL 11.66 0.0 firefox Application CVE-2023-25735 I6F4RK 11.66 0.0 firefox Application CVE-2023-25740 I6F4RJ 11.66 0.0 firefox Application CVE-2023-25744 I6F4RI 11.66 0.0 firefox Application CVE-2023-25746 I6F4RH 11.66 0.0 firefox Application CVE-2023-25742 I6F4RG 11.66 0.0 firefox Application CVE-2023-25728 I6F4RF 11.66 0.0 firefox Application CVE-2023-25737 I6F4RE 11.66 0.0 firefox Application CVE-2023-25734 I6F4RD 11.66 0.0 firefox Application CVE-2023-25745 I6F4RA 11.66 0.0 firefox Application CVE-2023-25743 I6F4R8 11.66 0.0 firefox Application CVE-2023-25741 I6F4R6 11.66 0.0 firefox Application CVE-2023-25729 I6F4R2 11.66 0.0 firefox Application CVE-2023-25732 I6F4QX 11.66 0.0 firefox Application CVE-2023-25733 I6F4QT 11.66 0.0 firefox Application CVE-2023-26242 I6GMYH 11.86 7.8 kernel Kernel CVE-2022-27672 I6FB6C 12.16 0.0 kernel Kernel CVE-2022-38090 I6FDF4 12.28 0.0 microcode_ctl System-tool CVE-2022-33196 I6FDF2 12.28 0.0 microcode_ctl System-tool CVE-2023-23934 I6FDE3 12.28 3.5 python-werkzeug Programming-language CVE-2023-0778 I6FEKK 12.53 0.0 podman sig-CloudNative CVE-2016-3092 I6JLSA 12.97 7.5 struts sig-Java CVE-2023-20052 I6FMJU 13.2 0.0 clamav Others CVE-2023-20032 I6FMJ3 13.2 0.0 clamav Others CVE-2023-0616 I6FOOO 13.39 0.0 thunderbird sig-desktop-apps openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D94F60.32558360]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
Results per page:
10
25
50
100
200