mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2025
January
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
List overview
Download
Sa-announce
April 2024
----- 2025 -----
January 2025
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
sa-announce@openeuler.org
1 participants
3 discussions
Start a n
N
ew thread
[Release] openEuler update_20240424版本发布公告
by update版本发布邮箱
26 Apr '24
26 Apr '24
主题: openEuler update_20240424版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。 本公示分为九部分: 1、openEuler-20.03-LTS-SP1 Update 20240424发布情况及待修复缺陷 2、openEuler-22.03-LTS Update 20240424发布情况及待修复缺陷 3、openEuler-22.03-LTS-SP1 Update 20240424发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP2 Update 20240424发布情况及待修复缺陷 5、openEuler-20.03-LTS-SP4 Update 20240424发布情况及待修复缺陷 6、openEuler-22.03-LTS-SP3 Update 20240424发布情况及待修复缺陷 7、openEuler 关键组件待修复CVE 清单 8、openEuler 关键组件待修复缺陷清单 9、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2024/05/10)提供 update_20240508 版本。 openEuler-20.03-LTS-SP1 Update 20240424 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞50个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBD?from=project-i…
CVE修复: CVE 仓库 score I9IS6E:CVE-2024-32458<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6E
> freerdp 9.8 I9IS6G:CVE-2024-32041<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6G
> freerdp 9.8 I9IS7K:CVE-2024-32459<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7K
> freerdp 9.8 I9IVRE:CVE-2024-32039<
https://gitee.com/src-openeuler/freerdp/issues/I9IVRE
> freerdp 9.8 I9J3WZ:CVE-2024-32658<
https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ
> freerdp 9.8 I9J3YJ:CVE-2024-32659<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ
> freerdp 9.8 I9HX1E:CVE-2024-32462<
https://gitee.com/src-openeuler/flatpak/issues/I9HX1E
> flatpak 8.4 I9FBRQ:CVE-2024-3446<
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
> qemu 8.2 I9IS6F:CVE-2024-32040<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6F
> freerdp 8.1 I9IS7M:CVE-2024-32460<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7M
> freerdp 8.1 I8YZNM:CVE-2023-52076<
https://gitee.com/src-openeuler/atril/issues/I8YZNM
> atril 7.8 I9F7ML:CVE-2023-50387<
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
> systemd 7.5 I9F7QD:CVE-2023-50868<
https://gitee.com/src-openeuler/systemd/issues/I9F7QD
> systemd 7.5 I9J3YI:CVE-2024-32660<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YI
> freerdp 7.5 I9HY69:CVE-2023-44488<
https://gitee.com/src-openeuler/firefox/issues/I9HY69
> firefox 7.5 I8TQCT:CVE-2023-6270<
https://gitee.com/src-openeuler/kernel/issues/I8TQCT
> kernel 7 I9GEXT:CVE-2024-32487<
https://gitee.com/src-openeuler/less/issues/I9GEXT
> less 6.8 I8DQ75:CVE-2023-47233<
https://gitee.com/src-openeuler/kernel/issues/I8DQ75
> kernel 6.3 I917JN:CVE-2024-24861<
https://gitee.com/src-openeuler/kernel/issues/I917JN
> kernel 6.3 I6AW3R:CVE-2023-0330<
https://gitee.com/src-openeuler/qemu/issues/I6AW3R
> qemu 6 I9FAAQ:CVE-2024-3447<
https://gitee.com/src-openeuler/qemu/issues/I9FAAQ
> qemu 6 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I8QF9K:CVE-2023-7042<
https://gitee.com/src-openeuler/kernel/issues/I8QF9K
> kernel 5.5 I91L79:CVE-2024-25739<
https://gitee.com/src-openeuler/kernel/issues/I91L79
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95B1R:CVE-2023-52524<
https://gitee.com/src-openeuler/kernel/issues/I95B1R
> kernel 5.5 I963KI:CVE-2022-48629<
https://gitee.com/src-openeuler/kernel/issues/I963KI
> kernel 5.5 I96GP1:CVE-2023-52607<
https://gitee.com/src-openeuler/kernel/issues/I96GP1
> kernel 5.5 I97NHS:CVE-2024-26615<
https://gitee.com/src-openeuler/kernel/issues/I97NHS
> kernel 5.5 I97NI1:CVE-2023-52486<
https://gitee.com/src-openeuler/kernel/issues/I97NI1
> kernel 5.5 I9DD86:CVE-2024-26654<
https://gitee.com/src-openeuler/kernel/issues/I9DD86
> kernel 5.5 I9DNZ2:CVE-2024-26663<
https://gitee.com/src-openeuler/kernel/issues/I9DNZ2
> kernel 5.5 I9E2EQ:CVE-2024-26696<
https://gitee.com/src-openeuler/kernel/issues/I9E2EQ
> kernel 5.5 I9HOEF:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
> kernel 5.5 I95ATI:CVE-2022-48627<
https://gitee.com/src-openeuler/kernel/issues/I95ATI
> kernel 4.4 I9E2GX:CVE-2023-52638<
https://gitee.com/src-openeuler/kernel/issues/I9E2GX
> kernel 1 I9E2MB:CVE-2024-26733<
https://gitee.com/src-openeuler/kernel/issues/I9E2MB
> kernel 1 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 1 I9E451:CVE-2024-26793<
https://gitee.com/src-openeuler/kernel/issues/I9E451
> kernel 1 I9E46O:CVE-2024-26801<
https://gitee.com/src-openeuler/kernel/issues/I9E46O
> kernel 1 I9E46W:CVE-2024-26805<
https://gitee.com/src-openeuler/kernel/issues/I9E46W
> kernel 1 I9FNFA:CVE-2021-47216<
https://gitee.com/src-openeuler/kernel/issues/I9FNFA
> kernel 1 I9FNFI:CVE-2021-47203<
https://gitee.com/src-openeuler/kernel/issues/I9FNFI
> kernel 1 I9FNFL:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9FNFL
> kernel 1 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 1 I9HK0E:CVE-2024-26908<
https://gitee.com/src-openeuler/kernel/issues/I9HK0E
> kernel 1 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 1 I9HL6U:CVE-2024-26920<
https://gitee.com/src-openeuler/kernel/issues/I9HL6U
> kernel 1 Bugfix: issue 仓库 #I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致 kernel #I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff kernel #I9HXKB:解决SELinux策略重载时IMA偶发的panic问题:解决SELinux策略重载时IMA偶发的panic问题 kernel #I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题 xorg-x11-server openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1 I3QGU7 系统不支持GB18030 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926 I4CMSV 【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 无优先级 sig/sig-mate-desktop src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240424 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞47个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIB7?from=project-i…
CVE修复: CVE 仓库 score I9IS6E:CVE-2024-32458<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6E
> freerdp 9.8 I9IS6G:CVE-2024-32041<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6G
> freerdp 9.8 I9IS7K:CVE-2024-32459<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7K
> freerdp 9.8 I9IVRE:CVE-2024-32039<
https://gitee.com/src-openeuler/freerdp/issues/I9IVRE
> freerdp 9.8 I9J3WZ:CVE-2024-32658<
https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ
> freerdp 9.8 I9J3YJ:CVE-2024-32659<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ
> freerdp 9.8 I8VT5F:CVE-2023-51698<
https://gitee.com/src-openeuler/atril/issues/I8VT5F
> atril 8.8 I9HX1E:CVE-2024-32462<
https://gitee.com/src-openeuler/flatpak/issues/I9HX1E
> flatpak 8.4 I92HWD:CVE-2024-24474<
https://gitee.com/src-openeuler/qemu/issues/I92HWD
> qemu 8.2 I9FBRQ:CVE-2024-3446<
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
> qemu 8.2 I9IS6F:CVE-2024-32040<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6F
> freerdp 8.1 I9IS7M:CVE-2024-32460<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7M
> freerdp 8.1 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I92OOJ:CVE-2023-52441<
https://gitee.com/src-openeuler/kernel/issues/I92OOJ
> kernel 7.8 I90BQX:CVE-2022-41723<
https://gitee.com/src-openeuler/skopeo/issues/I90BQX
> skopeo 7.5 I9F7ML:CVE-2023-50387<
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
> systemd 7.5 I9F7QD:CVE-2023-50868<
https://gitee.com/src-openeuler/systemd/issues/I9F7QD
> systemd 7.5 I9J3YI:CVE-2024-32660<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YI
> freerdp 7.5 I9HY69:CVE-2023-44488<
https://gitee.com/src-openeuler/firefox/issues/I9HY69
> firefox 7.5 I9GEXT:CVE-2024-32487<
https://gitee.com/src-openeuler/less/issues/I9GEXT
> less 6.8 I97NHT:CVE-2024-26608<
https://gitee.com/src-openeuler/kernel/issues/I97NHT
> kernel 6.5 I917JN:CVE-2024-24861<
https://gitee.com/src-openeuler/kernel/issues/I917JN
> kernel 6.3 I97NHC:CVE-2023-52491<
https://gitee.com/src-openeuler/kernel/issues/I97NHC
> kernel 6.2 I97NHW:CVE-2023-52492<
https://gitee.com/src-openeuler/kernel/issues/I97NHW
> kernel 6.2 I6AW3R:CVE-2023-0330<
https://gitee.com/src-openeuler/qemu/issues/I6AW3R
> qemu 6 I9FAAQ:CVE-2024-3447<
https://gitee.com/src-openeuler/qemu/issues/I9FAAQ
> qemu 6 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I8QF9K:CVE-2023-7042<
https://gitee.com/src-openeuler/kernel/issues/I8QF9K
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95B1R:CVE-2023-52524<
https://gitee.com/src-openeuler/kernel/issues/I95B1R
> kernel 5.5 I96GP1:CVE-2023-52607<
https://gitee.com/src-openeuler/kernel/issues/I96GP1
> kernel 5.5 I97NHS:CVE-2024-26615<
https://gitee.com/src-openeuler/kernel/issues/I97NHS
> kernel 5.5 I97NI1:CVE-2023-52486<
https://gitee.com/src-openeuler/kernel/issues/I97NI1
> kernel 5.5 I98BNA:CVE-2023-52608<
https://gitee.com/src-openeuler/kernel/issues/I98BNA
> kernel 5.5 I9DD86:CVE-2024-26654<
https://gitee.com/src-openeuler/kernel/issues/I9DD86
> kernel 5.5 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 5.5 I9E2EQ:CVE-2024-26696<
https://gitee.com/src-openeuler/kernel/issues/I9E2EQ
> kernel 5.5 I97NHA:CVE-2023-52493<
https://gitee.com/src-openeuler/kernel/issues/I97NHA
> kernel 5.1 I9AFM6:CVE-2024-28835<
https://gitee.com/src-openeuler/gnutls/issues/I9AFM6
> gnutls 5 I95B3Q:CVE-2023-52503<
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
> kernel 4.5 I97NHG:CVE-2023-52494<
https://gitee.com/src-openeuler/kernel/issues/I97NHG
> kernel 4.4 I97NIA:CVE-2023-52498<
https://gitee.com/src-openeuler/kernel/issues/I97NIA
> kernel 4.4 I99JXH:CVE-2023-52617<
https://gitee.com/src-openeuler/kernel/issues/I99JXH
> kernel 4.4 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 1 I9E466:CVE-2024-26795<
https://gitee.com/src-openeuler/kernel/issues/I9E466
> kernel 1 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 1 Bugfix: issue 仓库 #I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用 libsoup #I7VI96:例行分析dnf补丁,需要回合补丁:例行分析dnf补丁,需要回合补丁 dnf #I7VIAC:例行分析dnf-plugins-core补丁,需要回合补丁:例行分析dnf-plugins-core补丁,需要回合补丁 dnf-plugins-core #I9IID1:update to 11.0.23+8(ga):update to 11.0.23+8(ga) openjdk-11 #I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项 gcc #I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题 xorg-x11-server openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS update20230726 I7ORCE 【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild I5RTUS X86架构下无法对mysql8进行autobolt模式反馈编译,报错 无优先级 sig/Compiler,kind/feature src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild I5XP8E Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild I65UF9 aarch64架构boost icl模板库优化错误 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240424 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题6个,已知漏洞43个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIB8?from=project-i…
CVE修复: CVE 仓库 score I9IS6E:CVE-2024-32458<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6E
> freerdp 9.8 I9IS6G:CVE-2024-32041<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6G
> freerdp 9.8 I9IS7K:CVE-2024-32459<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7K
> freerdp 9.8 I9IVRE:CVE-2024-32039<
https://gitee.com/src-openeuler/freerdp/issues/I9IVRE
> freerdp 9.8 I9J3WZ:CVE-2024-32658<
https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ
> freerdp 9.8 I9J3YJ:CVE-2024-32659<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ
> freerdp 9.8 I9HX1E:CVE-2024-32462<
https://gitee.com/src-openeuler/flatpak/issues/I9HX1E
> flatpak 8.4 I9FBRQ:CVE-2024-3446<
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
> qemu 8.2 I9IS6F:CVE-2024-32040<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6F
> freerdp 8.1 I9IS7M:CVE-2024-32460<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7M
> freerdp 8.1 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I92OOJ:CVE-2023-52441<
https://gitee.com/src-openeuler/kernel/issues/I92OOJ
> kernel 7.8 I90BS5:CVE-2022-41723<
https://gitee.com/src-openeuler/ignition/issues/I90BS5
> ignition 7.5 I9F7ML:CVE-2023-50387<
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
> systemd 7.5 I9F7QD:CVE-2023-50868<
https://gitee.com/src-openeuler/systemd/issues/I9F7QD
> systemd 7.5 I9J3YI:CVE-2024-32660<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YI
> freerdp 7.5 I9HY69:CVE-2023-44488<
https://gitee.com/src-openeuler/firefox/issues/I9HY69
> firefox 7.5 I97NHT:CVE-2024-26608<
https://gitee.com/src-openeuler/kernel/issues/I97NHT
> kernel 6.5 I917JN:CVE-2024-24861<
https://gitee.com/src-openeuler/kernel/issues/I917JN
> kernel 6.3 I97NHC:CVE-2023-52491<
https://gitee.com/src-openeuler/kernel/issues/I97NHC
> kernel 6.2 I97NHW:CVE-2023-52492<
https://gitee.com/src-openeuler/kernel/issues/I97NHW
> kernel 6.2 I6AW3R:CVE-2023-0330<
https://gitee.com/src-openeuler/qemu/issues/I6AW3R
> qemu 6 I9FAAQ:CVE-2024-3447<
https://gitee.com/src-openeuler/qemu/issues/I9FAAQ
> qemu 6 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I8QF9K:CVE-2023-7042<
https://gitee.com/src-openeuler/kernel/issues/I8QF9K
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95B1R:CVE-2023-52524<
https://gitee.com/src-openeuler/kernel/issues/I95B1R
> kernel 5.5 I96GP1:CVE-2023-52607<
https://gitee.com/src-openeuler/kernel/issues/I96GP1
> kernel 5.5 I97NHS:CVE-2024-26615<
https://gitee.com/src-openeuler/kernel/issues/I97NHS
> kernel 5.5 I97NI1:CVE-2023-52486<
https://gitee.com/src-openeuler/kernel/issues/I97NI1
> kernel 5.5 I98BNA:CVE-2023-52608<
https://gitee.com/src-openeuler/kernel/issues/I98BNA
> kernel 5.5 I9DD86:CVE-2024-26654<
https://gitee.com/src-openeuler/kernel/issues/I9DD86
> kernel 5.5 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 5.5 I9E2EQ:CVE-2024-26696<
https://gitee.com/src-openeuler/kernel/issues/I9E2EQ
> kernel 5.5 I97NHA:CVE-2023-52493<
https://gitee.com/src-openeuler/kernel/issues/I97NHA
> kernel 5.1 I95B3Q:CVE-2023-52503<
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
> kernel 4.5 I97NHG:CVE-2023-52494<
https://gitee.com/src-openeuler/kernel/issues/I97NHG
> kernel 4.4 I97NIA:CVE-2023-52498<
https://gitee.com/src-openeuler/kernel/issues/I97NIA
> kernel 4.4 I99JXH:CVE-2023-52617<
https://gitee.com/src-openeuler/kernel/issues/I99JXH
> kernel 4.4 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 1 I9E466:CVE-2024-26795<
https://gitee.com/src-openeuler/kernel/issues/I9E466
> kernel 1 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 1 Bugfix: issue 仓库 #I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用 libsoup #I9HDFB:libdnf Modify loongarch64 patch use all arch:libdnf Modify loongarch64 patch use all arch libdnf #I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项 gcc #I8Y0RW:【OLK-5.10】cgroup1_writeback的死锁问题:【OLK-5.10】cgroup1_writeback的死锁问题 kernel #I99KM6:【OLK-5.10】cgroup1_writeback softlockup:【OLK-5.10】cgroup1_writeback softlockup kernel #I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题 xorg-x11-server openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 22.03-SP1 I6B4V1 【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1 I84L9F openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240424 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题11个,已知漏洞50个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBB?from=project-i…
CVE修复: CVE 仓库 score I9IS6E:CVE-2024-32458<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6E
> freerdp 9.8 I9IS6G:CVE-2024-32041<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6G
> freerdp 9.8 I9IS7K:CVE-2024-32459<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7K
> freerdp 9.8 I9IVRE:CVE-2024-32039<
https://gitee.com/src-openeuler/freerdp/issues/I9IVRE
> freerdp 9.8 I9J3WZ:CVE-2024-32658<
https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ
> freerdp 9.8 I9J3YJ:CVE-2024-32659<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ
> freerdp 9.8 I9C6X1:CVE-2024-3019<
https://gitee.com/src-openeuler/pcp/issues/I9C6X1
> pcp 8.8 I9HX1E:CVE-2024-32462<
https://gitee.com/src-openeuler/flatpak/issues/I9HX1E
> flatpak 8.4 I9FBRQ:CVE-2024-3446<
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
> qemu 8.2 I9IS6F:CVE-2024-32040<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6F
> freerdp 8.1 I9IS7M:CVE-2024-32460<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7M
> freerdp 8.1 I4BI7U:CVE-2019-25051<
https://gitee.com/src-openeuler/aspell/issues/I4BI7U
> aspell 7.8 I92OOJ:CVE-2023-52441<
https://gitee.com/src-openeuler/kernel/issues/I92OOJ
> kernel 7.8 I90BQX:CVE-2022-41723<
https://gitee.com/src-openeuler/skopeo/issues/I90BQX
> skopeo 7.5 I9F7ML:CVE-2023-50387<
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
> systemd 7.5 I9F7QD:CVE-2023-50868<
https://gitee.com/src-openeuler/systemd/issues/I9F7QD
> systemd 7.5 I9AVYL:CVE-2022-48279<
https://gitee.com/src-openeuler/mod_security/issues/I9AVYL
> mod_security 7.5 I9J3YI:CVE-2024-32660<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YI
> freerdp 7.5 I9HY69:CVE-2023-44488<
https://gitee.com/src-openeuler/firefox/issues/I9HY69
> firefox 7.5 I9GEXT:CVE-2024-32487<
https://gitee.com/src-openeuler/less/issues/I9GEXT
> less 6.8 I97NHT:CVE-2024-26608<
https://gitee.com/src-openeuler/kernel/issues/I97NHT
> kernel 6.5 I917JN:CVE-2024-24861<
https://gitee.com/src-openeuler/kernel/issues/I917JN
> kernel 6.3 I97NHC:CVE-2023-52491<
https://gitee.com/src-openeuler/kernel/issues/I97NHC
> kernel 6.2 I97NHW:CVE-2023-52492<
https://gitee.com/src-openeuler/kernel/issues/I97NHW
> kernel 6.2 I6AW3R:CVE-2023-0330<
https://gitee.com/src-openeuler/qemu/issues/I6AW3R
> qemu 6 I9FAAQ:CVE-2024-3447<
https://gitee.com/src-openeuler/qemu/issues/I9FAAQ
> qemu 6 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I8QF9K:CVE-2023-7042<
https://gitee.com/src-openeuler/kernel/issues/I8QF9K
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95AT9:CVE-2023-52575<
https://gitee.com/src-openeuler/kernel/issues/I95AT9
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95B1R:CVE-2023-52524<
https://gitee.com/src-openeuler/kernel/issues/I95B1R
> kernel 5.5 I96GP1:CVE-2023-52607<
https://gitee.com/src-openeuler/kernel/issues/I96GP1
> kernel 5.5 I97NHS:CVE-2024-26615<
https://gitee.com/src-openeuler/kernel/issues/I97NHS
> kernel 5.5 I97NI1:CVE-2023-52486<
https://gitee.com/src-openeuler/kernel/issues/I97NI1
> kernel 5.5 I98BNA:CVE-2023-52608<
https://gitee.com/src-openeuler/kernel/issues/I98BNA
> kernel 5.5 I9DD86:CVE-2024-26654<
https://gitee.com/src-openeuler/kernel/issues/I9DD86
> kernel 5.5 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 5.5 I9E2EQ:CVE-2024-26696<
https://gitee.com/src-openeuler/kernel/issues/I9E2EQ
> kernel 5.5 I97NHA:CVE-2023-52493<
https://gitee.com/src-openeuler/kernel/issues/I97NHA
> kernel 5.1 I9AFM6:CVE-2024-28835<
https://gitee.com/src-openeuler/gnutls/issues/I9AFM6
> gnutls 5 I95B3Q:CVE-2023-52503<
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
> kernel 4.5 I97NHG:CVE-2023-52494<
https://gitee.com/src-openeuler/kernel/issues/I97NHG
> kernel 4.4 I97NIA:CVE-2023-52498<
https://gitee.com/src-openeuler/kernel/issues/I97NIA
> kernel 4.4 I99JXH:CVE-2023-52617<
https://gitee.com/src-openeuler/kernel/issues/I99JXH
> kernel 4.4 I95ATO:CVE-2023-52567<
https://gitee.com/src-openeuler/kernel/issues/I95ATO
> kernel 2.3 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 1 I9E466:CVE-2024-26795<
https://gitee.com/src-openeuler/kernel/issues/I9E466
> kernel 1 I9FNFK:CVE-2021-47182<
https://gitee.com/src-openeuler/kernel/issues/I9FNFK
> kernel 1 Bugfix: issue 仓库 #I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用 libsoup #I9HDFB:libdnf Modify loongarch64 patch use all arch:libdnf Modify loongarch64 patch use all arch libdnf #I7GH64:例行分析dnf-plugins-core补丁,需要回合补丁:例行分析dnf-plugins-core补丁,需要回合补丁 dnf-plugins-core #I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项 gcc #I8ELKA:cpufreq: CPPC: 修正 cppc_get_perf_ctrs_sample 的 cpu参数:cpufreq: CPPC: 修正 cppc_get_perf_ctrs_sample 的 cpu参数 kernel #I8TPP6:全核上下线后,设置policy318频率未响应,重定向到cpu0和1:全核上下线后,设置policy318频率未响应,重定向到cpu0和1 kernel #I8W708:cpufreq: schedutils/conservative/ondemand 采样频率异常:cpufreq: schedutils/conservative/ondemand 采样频率异常 kernel #I8WAED:cpufreq: bios 要求支持上报cpu最高频率和最低频率相等的场景:cpufreq: bios 要求支持上报cpu最高频率和最低频率相等的场景 kernel #I8Y0RW:【OLK-5.10】cgroup1_writeback的死锁问题:【OLK-5.10】cgroup1_writeback的死锁问题 kernel #I99KM6:【OLK-5.10】cgroup1_writeback softlockup:【OLK-5.10】cgroup1_writeback softlockup kernel #I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题 xorg-x11-server openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 主要 sig/sig-CloudNative src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 主要 sig-AccLib src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018 I89NB0 22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本 次要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2 I7B6X5 gcc-pie-arm64架构和操作手册结果不同 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240424 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题4个,已知漏洞47个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBE?from=project-i…
CVE修复: CVE 仓库 score I9IS6E:CVE-2024-32458<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6E
> freerdp 9.8 I9IS6G:CVE-2024-32041<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6G
> freerdp 9.8 I9IS7K:CVE-2024-32459<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7K
> freerdp 9.8 I9IVRE:CVE-2024-32039<
https://gitee.com/src-openeuler/freerdp/issues/I9IVRE
> freerdp 9.8 I9J3WZ:CVE-2024-32658<
https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ
> freerdp 9.8 I9J3YJ:CVE-2024-32659<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ
> freerdp 9.8 I9HX1E:CVE-2024-32462<
https://gitee.com/src-openeuler/flatpak/issues/I9HX1E
> flatpak 8.4 I9FBRQ:CVE-2024-3446<
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
> qemu 8.2 I9IS6F:CVE-2024-32040<
https://gitee.com/src-openeuler/freerdp/issues/I9IS6F
> freerdp 8.1 I9IS7M:CVE-2024-32460<
https://gitee.com/src-openeuler/freerdp/issues/I9IS7M
> freerdp 8.1 I9F7ML:CVE-2023-50387<
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
> systemd 7.5 I9F7QD:CVE-2023-50868<
https://gitee.com/src-openeuler/systemd/issues/I9F7QD
> systemd 7.5 I9J3YI:CVE-2024-32660<
https://gitee.com/src-openeuler/freerdp/issues/I9J3YI
> freerdp 7.5 I9HY69:CVE-2023-44488<
https://gitee.com/src-openeuler/firefox/issues/I9HY69
> firefox 7.5 I8TQCT:CVE-2023-6270<
https://gitee.com/src-openeuler/kernel/issues/I8TQCT
> kernel 7 I8DQ75:CVE-2023-47233<
https://gitee.com/src-openeuler/kernel/issues/I8DQ75
> kernel 6.3 I917JN:CVE-2024-24861<
https://gitee.com/src-openeuler/kernel/issues/I917JN
> kernel 6.3 I6AW3R:CVE-2023-0330<
https://gitee.com/src-openeuler/qemu/issues/I6AW3R
> qemu 6 I9FAAQ:CVE-2024-3447<
https://gitee.com/src-openeuler/qemu/issues/I9FAAQ
> qemu 6 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I8QF9K:CVE-2023-7042<
https://gitee.com/src-openeuler/kernel/issues/I8QF9K
> kernel 5.5 I91L79:CVE-2024-25739<
https://gitee.com/src-openeuler/kernel/issues/I91L79
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95B1R:CVE-2023-52524<
https://gitee.com/src-openeuler/kernel/issues/I95B1R
> kernel 5.5 I963KI:CVE-2022-48629<
https://gitee.com/src-openeuler/kernel/issues/I963KI
> kernel 5.5 I96GP1:CVE-2023-52607<
https://gitee.com/src-openeuler/kernel/issues/I96GP1
> kernel 5.5 I97NHS:CVE-2024-26615<
https://gitee.com/src-openeuler/kernel/issues/I97NHS
> kernel 5.5 I97NI1:CVE-2023-52486<
https://gitee.com/src-openeuler/kernel/issues/I97NI1
> kernel 5.5 I9DD86:CVE-2024-26654<
https://gitee.com/src-openeuler/kernel/issues/I9DD86
> kernel 5.5 I9DNZ2:CVE-2024-26663<
https://gitee.com/src-openeuler/kernel/issues/I9DNZ2
> kernel 5.5 I9E2EQ:CVE-2024-26696<
https://gitee.com/src-openeuler/kernel/issues/I9E2EQ
> kernel 5.5 I9HOEF:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
> kernel 5.5 I95ATI:CVE-2022-48627<
https://gitee.com/src-openeuler/kernel/issues/I95ATI
> kernel 4.4 I9E2GX:CVE-2023-52638<
https://gitee.com/src-openeuler/kernel/issues/I9E2GX
> kernel 1 I9E2MB:CVE-2024-26733<
https://gitee.com/src-openeuler/kernel/issues/I9E2MB
> kernel 1 I9E2O3:CVE-2024-26764<
https://gitee.com/src-openeuler/kernel/issues/I9E2O3
> kernel 1 I9E451:CVE-2024-26793<
https://gitee.com/src-openeuler/kernel/issues/I9E451
> kernel 1 I9E46O:CVE-2024-26801<
https://gitee.com/src-openeuler/kernel/issues/I9E46O
> kernel 1 I9E46W:CVE-2024-26805<
https://gitee.com/src-openeuler/kernel/issues/I9E46W
> kernel 1 I9FNFA:CVE-2021-47216<
https://gitee.com/src-openeuler/kernel/issues/I9FNFA
> kernel 1 I9FNFI:CVE-2021-47203<
https://gitee.com/src-openeuler/kernel/issues/I9FNFI
> kernel 1 I9FNFL:CVE-2021-47210<
https://gitee.com/src-openeuler/kernel/issues/I9FNFL
> kernel 1 I9FNFQ:CVE-2021-47211<
https://gitee.com/src-openeuler/kernel/issues/I9FNFQ
> kernel 1 I9HK0E:CVE-2024-26908<
https://gitee.com/src-openeuler/kernel/issues/I9HK0E
> kernel 1 I9HK6X:CVE-2024-26884<
https://gitee.com/src-openeuler/kernel/issues/I9HK6X
> kernel 1 I9HL6U:CVE-2024-26920<
https://gitee.com/src-openeuler/kernel/issues/I9HL6U
> kernel 1 Bugfix: issue 仓库 #I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致 kernel #I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff kernel #I9HXKB:解决SELinux策略重载时IMA偶发的panic问题:解决SELinux策略重载时IMA偶发的panic问题 kernel #I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题 xorg-x11-server openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-20.03-LTS-SP4-round-1 I8DT5M 【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败 主要 sig/bigdata src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1 I8EKUI 【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败 主要 sig/sig-security-fac src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2 I8GDGR 【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住 主要 sig/GNOME src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha I8B7XU 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 主要 sig/oVirt src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2 I8G371 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 次要 sig/DB src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild I8GUMP [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything 不重要 sig/Networking src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild I8I8DQ [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol 不重要 sig/sig-mate-desktop src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240424 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题14个,已知漏洞62个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9II2W?from=project-i…
CVE修复: CVE 仓库 score #I9IS6E:CVE-2024-32458<
https://gitee.com/open_euler/dashboard?issue_id=I9IS6E
> freerdp 9.8 #I9IS6G:CVE-2024-32041<
https://gitee.com/open_euler/dashboard?issue_id=I9IS6G
> freerdp 9.8 #I9IS7K:CVE-2024-32459<
https://gitee.com/open_euler/dashboard?issue_id=I9IS7K
> freerdp 9.8 #I9IVRE:CVE-2024-32039<
https://gitee.com/open_euler/dashboard?issue_id=I9IVRE
> freerdp 9.8 #I9J3WZ:CVE-2024-32658<
https://gitee.com/open_euler/dashboard?issue_id=I9J3WZ
> freerdp 9.8 #I9J3YJ:CVE-2024-32659<
https://gitee.com/open_euler/dashboard?issue_id=I9J3YJ
> freerdp 9.8 #I9HX1E:CVE-2024-32462<
https://gitee.com/open_euler/dashboard?issue_id=I9HX1E
> flatpak 8.4 #I9FBRQ:CVE-2024-3446<
https://gitee.com/open_euler/dashboard?issue_id=I9FBRQ
> qemu 8.2 #I9IS6F:CVE-2024-32040<
https://gitee.com/open_euler/dashboard?issue_id=I9IS6F
> freerdp 8.1 #I9IS7M:CVE-2024-32460<
https://gitee.com/open_euler/dashboard?issue_id=I9IS7M
> freerdp 8.1 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I92OOJ:CVE-2023-52441<
https://gitee.com/open_euler/dashboard?issue_id=I92OOJ
> kernel 7.8 #I9F7ML:CVE-2023-50387<
https://gitee.com/open_euler/dashboard?issue_id=I9F7ML
> systemd 7.5 #I9F7QD:CVE-2023-50868<
https://gitee.com/open_euler/dashboard?issue_id=I9F7QD
> systemd 7.5 #I9J3YI:CVE-2024-32660<
https://gitee.com/open_euler/dashboard?issue_id=I9J3YI
> freerdp 7.5 #I9HY69:CVE-2023-44488<
https://gitee.com/open_euler/dashboard?issue_id=I9HY69
> firefox 7.5 #I8TQCT:CVE-2023-6270<
https://gitee.com/open_euler/dashboard?issue_id=I8TQCT
> kernel 7 #I9GEXT:CVE-2024-32487<
https://gitee.com/open_euler/dashboard?issue_id=I9GEXT
> less 6.8 #I97NHT:CVE-2024-26608<
https://gitee.com/open_euler/dashboard?issue_id=I97NHT
> kernel 6.5 #I917JN:CVE-2024-24861<
https://gitee.com/open_euler/dashboard?issue_id=I917JN
> kernel 6.3 #I8DQ75:CVE-2023-47233<
https://gitee.com/open_euler/dashboard?issue_id=I8DQ75
> kernel 6.3 #I97NHC:CVE-2023-52491<
https://gitee.com/open_euler/dashboard?issue_id=I97NHC
> kernel 6.2 #I97NHW:CVE-2023-52492<
https://gitee.com/open_euler/dashboard?issue_id=I97NHW
> kernel 6.2 #I6AW3R:CVE-2023-0330<
https://gitee.com/open_euler/dashboard?issue_id=I6AW3R
> qemu 6 #I9FAAQ:CVE-2024-3447<
https://gitee.com/open_euler/dashboard?issue_id=I9FAAQ
> qemu 6 #I9F9VB:CVE-2024-2511<
https://gitee.com/open_euler/dashboard?issue_id=I9F9VB
> edk2 5.9 #I8QF9K:CVE-2023-7042<
https://gitee.com/open_euler/dashboard?issue_id=I8QF9K
> kernel 5.5 #I95AT0:CVE-2023-52504<
https://gitee.com/open_euler/dashboard?issue_id=I95AT0
> kernel 5.5 #I95AT9:CVE-2023-52575<
https://gitee.com/open_euler/dashboard?issue_id=I95AT9
> kernel 5.5 #I95ATZ:CVE-2023-52574<
https://gitee.com/open_euler/dashboard?issue_id=I95ATZ
> kernel 5.5 #I95B1R:CVE-2023-52524<
https://gitee.com/open_euler/dashboard?issue_id=I95B1R
> kernel 5.5 #I96GP1:CVE-2023-52607<
https://gitee.com/open_euler/dashboard?issue_id=I96GP1
> kernel 5.5 #I97NHS:CVE-2024-26615<
https://gitee.com/open_euler/dashboard?issue_id=I97NHS
> kernel 5.5 #I97NI1:CVE-2023-52486<
https://gitee.com/open_euler/dashboard?issue_id=I97NI1
> kernel 5.5 #I98BNA:CVE-2023-52608<
https://gitee.com/open_euler/dashboard?issue_id=I98BNA
> kernel 5.5 #I9DD86:CVE-2024-26654<
https://gitee.com/open_euler/dashboard?issue_id=I9DD86
> kernel 5.5 #I9DO1Z:CVE-2024-26656<
https://gitee.com/open_euler/dashboard?issue_id=I9DO1Z
> kernel 5.5 #I9E2EQ:CVE-2024-26696<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ
> kernel 5.5 #I97NHA:CVE-2023-52493<
https://gitee.com/open_euler/dashboard?issue_id=I97NHA
> kernel 5.1 #I9AFM6:CVE-2024-28835<
https://gitee.com/open_euler/dashboard?issue_id=I9AFM6
> gnutls 5 #I95B3Q:CVE-2023-52503<
https://gitee.com/open_euler/dashboard?issue_id=I95B3Q
> kernel 4.5 #I97NHG:CVE-2023-52494<
https://gitee.com/open_euler/dashboard?issue_id=I97NHG
> kernel 4.4 #I97NIA:CVE-2023-52498<
https://gitee.com/open_euler/dashboard?issue_id=I97NIA
> kernel 4.4 #I99JXH:CVE-2023-52617<
https://gitee.com/open_euler/dashboard?issue_id=I99JXH
> kernel 4.4 #I95ATO:CVE-2023-52567<
https://gitee.com/open_euler/dashboard?issue_id=I95ATO
> kernel 2.3 #I9E2H0:CVE-2023-52637<
https://gitee.com/open_euler/dashboard?issue_id=I9E2H0
> kernel 1 #I9E2LZ:CVE-2024-26739<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ
> kernel 1 #I9E2M1:CVE-2024-26734<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M1
> kernel 1 #I9E2MB:CVE-2024-26733<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MB
> kernel 1 #I9E2O3:CVE-2024-26764<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O3
> kernel 1 #I9E46O:CVE-2024-26801<
https://gitee.com/open_euler/dashboard?issue_id=I9E46O
> kernel 1 #I9E46W:CVE-2024-26805<
https://gitee.com/open_euler/dashboard?issue_id=I9E46W
> kernel 1 #I9E47C:CVE-2024-26804<
https://gitee.com/open_euler/dashboard?issue_id=I9E47C
> kernel 1 #I9E49K:CVE-2024-26808<
https://gitee.com/open_euler/dashboard?issue_id=I9E49K
> kernel 1 #I9FNF8:CVE-2021-47212<
https://gitee.com/open_euler/dashboard?issue_id=I9FNF8
> kernel 1 #I9FNFK:CVE-2021-47182<
https://gitee.com/open_euler/dashboard?issue_id=I9FNFK
> kernel 1 #I9FNFQ:CVE-2021-47211<
https://gitee.com/open_euler/dashboard?issue_id=I9FNFQ
> kernel 1 #I9FNFU:CVE-2021-47199<
https://gitee.com/open_euler/dashboard?issue_id=I9FNFU
> kernel 1 #I9HK0E:CVE-2024-26908<
https://gitee.com/open_euler/dashboard?issue_id=I9HK0E
> kernel 1 #I9HKEH:CVE-2024-26895<
https://gitee.com/open_euler/dashboard?issue_id=I9HKEH
> kernel 1 #I9HL6L:CVE-2024-26917<
https://gitee.com/open_euler/dashboard?issue_id=I9HL6L
> kernel 1 #I9HL6U:CVE-2024-26920<
https://gitee.com/open_euler/dashboard?issue_id=I9HL6U
> kernel 1 Bugfix: issue 仓库 #I9HCQ7:修复CVE-2024-31083引入的双重释放问题<
https://gitee.com/open_euler/dashboard?issue_id=I9HCQ7
> xorg-x11-server #I9HHPO:当前版本,seinux状态为enforce,会影响部分进程打补丁 (22.03-LTS-SP3)<
https://gitee.com/open_euler/dashboard?issue_id=I9HHPO
> syscare #I9FSEN:syscare加载激活之后,补丁内容未生效<
https://gitee.com/open_euler/dashboard?issue_id=I9FSEN
> syscare #I9FI9K:22-03当前版本syscare check命令无法检测符号冲突<
https://gitee.com/open_euler/dashboard?issue_id=I9FI9K
> syscare #I9FGS2:selinux关闭的情况下,upatch服务启动失败<
https://gitee.com/open_euler/dashboard?issue_id=I9FGS2
> syscare #I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用<
https://gitee.com/open_euler/dashboard?issue_id=I9H7IN
> libsoup #I90ZKU:gcc是否可以选择默认禁用isl选项<
https://gitee.com/open_euler/dashboard?issue_id=I90ZKU
> gcc #I9J9U2:【openEuler-22.03-LTS-SP3】gala-gopher提供eBPF全栈可观测能力(openEuler 2403 LTS同步)<
https://gitee.com/open_euler/dashboard?issue_id=I9J9U2
> gala-gopher #I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<
https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ
> kernel #I99KM6:【OLK-5.10】cgroup1_writeback softlockup<
https://gitee.com/open_euler/dashboard?issue_id=I99KM6
> kernel #I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致<
https://gitee.com/open_euler/dashboard?issue_id=I9H4XD
> kernel #I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff<
https://gitee.com/open_euler/dashboard?issue_id=I9H4YE
> kernel #I9HNHF:【OLK-5.10】scsi: hisi_sas: Remove hisi_hba->timer for v3 hw<
https://gitee.com/open_euler/dashboard?issue_id=I9HNHF
> kernel #I9HXKB:解决SELinux策略重载时IMA偶发的panic问题<
https://gitee.com/open_euler/dashboard?issue_id=I9HXKB
> kernel openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-22.03-LTS-SP3 I96ID7 [22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp 主要 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.26日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 SIG issue码云链接 CVE-2021-47194 I9FNG2 9.33 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNG2
CVE-2021-47198 I9FNFZ 9.33 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNFZ
CVE-2023-52628 I9CH5W 10.83 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9CH5W
CVE-2024-1135 I9H10B 5.33 7.5 python-gunicorn sig-python-modules
https://gitee.com/src-openeuler/python-gunicorn/issues/I9H10B
CVE-2024-2757 I9G2UU 9.67 7.5 php Base-service
https://gitee.com/src-openeuler/php/issues/I9G2UU
CVE-2024-32662 I9J3YP 13.33 7.5 freerdp Application
https://gitee.com/src-openeuler/freerdp/issues/I9J3YP
CVE-2024-32661 I9J3YK 13.33 7.5 freerdp Application
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
CVE-2023-3758 I9HWXO 8.33 7.1 sssd Base-service
https://gitee.com/src-openeuler/sssd/issues/I9HWXO
CVE-2023-28100 I9AVQ9 10.14 6.5 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-52610 I99JTC 12.67 6.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JTC
CVE-2024-2397 I9E7NF 11.33 6.3 tcpdump Networking
https://gitee.com/src-openeuler/tcpdump/issues/I9E7NF
CVE-2024-26641 I99JV2 12.67 6.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JV2
CVE-2024-26635 I99JSA 12.67 6.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JSA
CVE-2023-52612 I99K14 12.67 6 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K14
CVE-2024-27188 I9C1XR 1.33 5.9 plasma-breeze sig-KDE
https://gitee.com/src-openeuler/plasma-breeze/issues/I9C1XR
CVE-2024-28867 I9CTY2 3.33 5.9 prometheus sig-CloudNative
https://gitee.com/src-openeuler/prometheus/issues/I9CTY2
CVE-2023-48795 I9AYAQ 4.14 5.9 libssh2 Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-26614 I97NHZ 5.61 5.9 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHZ
CVE-2023-48795 I9AYAU 11.14 5.9 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2024-3262 I9E4AO 9.33 5.5 openjfx11 Compiler
https://gitee.com/src-openeuler/openjfx11/issues/I9E4AO
CVE-2024-26633 I99K08 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K08
CVE-2024-26636 I99JVI 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JVI
CVE-2023-52619 I99JQV 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JQV
CVE-2021-47119 I990AW 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AW
CVE-2021-47111 I990AT 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AT
CVE-2021-47117 I990AP 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AP
CVE-2021-47120 I990AE 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AE
CVE-2021-47127 I990AC 12.67 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AC
CVE-2023-22081 I88VNW 8.14 5.3 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2021-47121 I990B2 12.67 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990B2
CVE-2023-52618 I99K1F 12.67 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K1F
CVE-2023-52614 I99JWC 12.67 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JWC
CVE-2023-52615 I99JR3 12.67 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JR3
CVE-2024-28180 I9C55E 8.14 4.3 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
CVE-2023-28101 I9AVQ7 10.14 4.3 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-45803 I9C54B 1.33 4.2 python-s3transfer sig-python-modules
https://gitee.com/src-openeuler/python-s3transfer/issues/I9C54B
CVE-2023-45803 I9C543 1.33 4.2 fence-agents sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9C543
CVE-2023-52609 I99JWJ 12.67 4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JWJ
CVE-2023-22025 I88JFX 8.14 3.7 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
社区关键组件待修复缺陷: openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。 社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑): 序号 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 I4MFPO webbench成功执行后返回值不为0 缺陷 2021/12/14 14:34 无优先级 src-openEuler/webbench Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4MFPO
2 I4ON3D Log4j 漏洞风险 任务 2021/12/29 19:21 无优先级 src-openEuler/flink Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4ON3D
3 I52YS4 [合规提升]建议统一spec文件的License名称规范 任务 2022/4/15 16:55 无优先级 src-openEuler/perl-Compress-LZF Kernel
https://gitee.com/open_euler/dashboard?issue_id=I52YS4
4 I58ASM 初始化kylin-printer仓库 任务 2022/5/19 16:38 无优先级 src-openEuler/kylin-printer Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58ASM
5 I5CXW7 Submit yaml file into this repository: openEuler_chroot 任务 2022/6/18 15:44 无优先级 src-openEuler/openEuler_chroot Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5CXW7
6 I5DV0T Upgrade to latest release [derby: 10.13.1.1 -> 10.16.1.1] 任务 2022/6/24 2:05 无优先级 src-openEuler/derby Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DV0T
7 I5DX0S Upgrade to latest release [rubygem-concurrent-ruby: 1.0.5 -> 1.1.10] 任务 2022/6/24 11:25 无优先级 src-openEuler/rubygem-concurrent-ruby Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DX0S
8 I5DZZ9 Upgrade to latest release [rubygem-prawn: 2.2.2 -> 2.4.0] 任务 2022/6/24 16:12 无优先级 src-openEuler/rubygem-prawn Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DZZ9
9 I5NU9G 注意changelog撰写规范 任务 2022/8/24 11:31 无优先级 src-openEuler/hdf Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5NU9G
10 I5P376 spec编包缺失依赖 任务 2022/8/31 22:03 无优先级 src-openEuler/rubygem-activemodel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5P376
11 I5P37L spec编包缺失依赖 任务 2022/8/31 22:04 无优先级 src-openEuler/xfce4-battery-plugin Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5P37L
12 I5TKU3 Submit yaml file into this repository: R-mockery 任务 2022/9/28 14:08 无优先级 src-openEuler/R-mockery Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKU3
13 I5TKU4 Submit yaml file into this repository: R-multcomp 任务 2022/9/28 14:09 无优先级 src-openEuler/R-multcomp Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKU4
14 I5TKV0 Submit yaml file into this repository: R-pkgbuild 任务 2022/9/28 14:09 无优先级 src-openEuler/R-pkgbuild Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKV0
15 I6B499 Upgrade to latest release [qt5-qttranslations: 5.15.2 -> 6.4.2] 任务 2023/1/19 23:11 无优先级 src-openEuler/qt5-qttranslations Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6B499
16 I6B94H Upgrade to latest release [xmltool: 3.3 -> 4.4] 任务 2023/1/27 21:12 无优先级 src-openEuler/xmltool Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6B94H
17 I6BE0L Upgrade to latest release [python-hamcrest: 2.0.3 -> 2.0.4] 任务 2023/1/28 18:44 无优先级 src-openEuler/python-hamcrest sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6BE0L
18 I6BE2Y Upgrade to latest release [python-pyroute2: 0.7.3 -> 0.7.4] 任务 2023/1/28 19:21 无优先级 src-openEuler/python-pyroute2 Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6BE2Y
19 I6FNAE 该仓库为空,建议加入 任务 2023/2/16 18:05 无优先级 src-openEuler/clitest Virt
https://gitee.com/open_euler/dashboard?issue_id=I6FNAE
20 I6IPE2 qla2xxx.spec 编译的rpm,在系统安装的过程中动态加载时识别不了 缺陷 2023/3/1 13:53 无优先级 src-openEuler/qla2xxx Networking
https://gitee.com/open_euler/dashboard?issue_id=I6IPE2
21 I6JP1M arm 架构 bpftrace 跟踪内核filp_close 函数显示未知错误 缺陷 2023/3/4 17:28 无优先级 src-openEuler/bpftrace Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6JP1M
22 I6PZB8 【20.03 LTS SP1】【DWS】发送端创建100个连接会打印11信号自动断开 缺陷 2023/3/24 16:50 无优先级 src-openEuler/gazelle Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6PZB8
23 I6UPXP CC 编译错误及 undefined reference 修正 任务 2023/4/11 14:56 无优先级 src-openEuler/dietlibc Virt
https://gitee.com/open_euler/dashboard?issue_id=I6UPXP
24 I6UUU5 CC 编译错误修正 任务 2023/4/11 20:03 无优先级 src-openEuler/zerofree Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6UUU5
25 I6VLU3 在使用openEuler-20.03-LTS-SP2 最小化安装后再安装gnome桌面出现输入用户名密码之后卡住 缺陷 2023/4/14 10:16 无优先级 src-openEuler/gnome-desktop3 Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6VLU3
26 I6XBUH 源代码内指定 gcc 编译器导致 LLVM 下编译错误 任务 2023/4/20 14:45 无优先级 src-openEuler/tss2 Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6XBUH
27 I7I4U6 redis高并发场景,连接数越多,性能越差 任务 2023/7/4 9:24 无优先级 src-openEuler/gazelle Virt
https://gitee.com/open_euler/dashboard?issue_id=I7I4U6
28 I7ITRW freeipa-4.9.3版本执行ipa-server-install时存在报错,希望可以合入社区修复的补丁 缺陷 2023/7/6 9:37 无优先级 src-openEuler/freeipa Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7ITRW
29 I7U1TR 【openEuler-23.09】依赖的libbpf非来自openeuler 缺陷 2023/8/17 17:44 无优先级 src-openEuler/dwarves Virt
https://gitee.com/open_euler/dashboard?issue_id=I7U1TR
30 I7UGHV kmod-kvdo 缺陷 2023/8/19 16:52 无优先级 src-openEuler/kmod-kvdo Computing
https://gitee.com/open_euler/dashboard?issue_id=I7UGHV
31 I7VXRH gtest在master分支升级至1.14.0,导致dtkwidget构建失败 任务 2023/8/25 15:00 无优先级 src-openEuler/dtkwidget Kernel
https://gitee.com/open_euler/dashboard?issue_id=I7VXRH
32 I80JV0 增加软件包%check区段,启动软件包自测试 任务 2023/9/12 9:24 无优先级 src-openEuler/python-xyzservices Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80JV0
33 I80K4D 需要增加软件包%check区段,启动软件包自测试 任务 2023/9/12 9:40 无优先级 src-openEuler/python-black Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80K4D
34 I80ZT7 需要增加%check区段,启动软件包自测试 任务 2023/9/13 14:08 无优先级 src-openEuler/python-jaraco.test Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80ZT7
35 I818KI python-mock升级,导致python-jaeger-client编译check阶段失败,请修改 任务 2023/9/14 10:09 无优先级 src-openEuler/python-jaeger-client Base-service
https://gitee.com/open_euler/dashboard?issue_id=I818KI
36 I8SRJO Upgrade to latest release [jboss-logmanager: 2.1.19 2022/10/06 -> 3.0.4 2023/12/20] 任务 2024/1/2 9:49 无优先级 src-openEuler/jboss-logmanager Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SRJO
37 I8SZ31 Upgrade to latest release [kcharselect: 23.04.3 2023/07/04 -> 24.01.85 2023/12/18] 任务 2024/1/2 16:21 无优先级 src-openEuler/kcharselect Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8SZ31
38 I8UNYM Upgrade to latest release [nodejs-string-dot-prototype-dot-trim: 1.1.2 2016/02/06 -> 1.2.8 2023/09/07] 任务 2024/1/9 10:47 无优先级 src-openEuler/nodejs-string-dot-prototype-dot-trim sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8UNYM
39 I8UNYS Upgrade to latest release [nodejs-faye-websocket: 0.7.2 2013/12/29 -> 0.11.4 2021/05/24] 任务 2024/1/9 10:47 无优先级 src-openEuler/nodejs-faye-websocket sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8UNYS
40 I8UUK8 Upgrade to latest release [nodejs-grunt-contrib-nodeunit: 0.4.1 2014/06/21 -> 5.0.0 2023/03/15] 任务 2024/1/9 17:52 无优先级 src-openEuler/nodejs-grunt-contrib-nodeunit Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UUK8
41 I8UUL0 Upgrade to latest release [nodejs-es5-ext: 0.10.56 2022/03/07 -> 1.7.0 2022/08/31] 任务 2024/1/9 17:54 无优先级 src-openEuler/nodejs-es5-ext Virt
https://gitee.com/open_euler/dashboard?issue_id=I8UUL0
42 I8UVBG Upgrade to latest release [nodejs-form-data: 0.2.0 -/-/- -> 4.0.0 2021/02/15] 任务 2024/1/9 19:22 无优先级 src-openEuler/nodejs-form-data Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8UVBG
43 I8YGDD 【22.03-LTS】【arm/x86】libpq-devel和postgresql-server-devel存在安装冲突 任务 2024/1/24 10:51 无优先级 src-openEuler/postgresql DB
https://gitee.com/open_euler/dashboard?issue_id=I8YGDD
44 I949X2 Vim在eulermaker容器环境构建存在测试用例失败 任务 2024/2/28 9:17 无优先级 src-openEuler/vim Base-service
https://gitee.com/open_euler/dashboard?issue_id=I949X2
45 I94M5Q rust 1.51 fails to build on X86_64 with llvm 10 缺陷 2024/2/29 10:36 无优先级 src-openEuler/rust sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I94M5Q
46 I999T1 当前仓库与perl-DBIx-Class重复,可关闭 任务 2024/3/18 10:04 无优先级 src-openEuler/perl-DBIx-Class-Storage-Statistics Kernel
https://gitee.com/open_euler/dashboard?issue_id=I999T1
47 I99CPK PXE部署过程中。TFTP下载镜像文件失败问题 任务 2024/3/18 12:08 无优先级 src-openEuler/anaconda Kernel
https://gitee.com/open_euler/dashboard?issue_id=I99CPK
48 I99EWY Upgrade version 1.31->1.35 任务 2024/3/18 15:01 无优先级 src-openEuler/perl-Module-ScanDeps Kernel
https://gitee.com/open_euler/dashboard?issue_id=I99EWY
49 I99H04 初始化仓库 任务 2024/3/18 16:33 无优先级 src-openEuler/perl-Devel-Autoflush Base-service
https://gitee.com/open_euler/dashboard?issue_id=I99H04
openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
>
1
0
0
0
[Release] openEuler update_20240417版本发布公告
by update版本发布邮箱
19 Apr '24
19 Apr '24
主题: openEuler update_20240417版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。 本公示分为九部分: 1、openEuler-20.03-LTS-SP1 Update 20240417发布情况及待修复缺陷 2、openEuler-22.03-LTS Update 20240417发布情况及待修复缺陷 3、openEuler-22.03-LTS-SP1 Update 20240417发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP2 Update 20240417发布情况及待修复缺陷 5、openEuler-20.03-LTS-SP4 Update 20240417发布情况及待修复缺陷 6、openEuler-22.03-LTS-SP3 Update 20240417发布情况及待修复缺陷 7、openEuler 关键组件待修复CVE 清单 8、openEuler 关键组件待修复缺陷清单 9、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2024/04/26)提供 update_20240424 版本。 openEuler-20.03-LTS-SP1 Update 20240417 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞79个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHN?from=project-i…
CVE修复: CVE 仓库 score #I91349:CVE-2020-36773<
https://gitee.com/open_euler/dashboard?issue_id=I91349
> ghostscript 9.8 #I990AF:CVE-2021-47131<
https://gitee.com/open_euler/dashboard?issue_id=I990AF
> kernel 7.8 #I9E2PR:CVE-2023-45288<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PR
> golang 7.5 #I94VO4:CVE-2021-47061<
https://gitee.com/open_euler/dashboard?issue_id=I94VO4
> kernel 6.7 #I94VOL:CVE-2021-47063<
https://gitee.com/open_euler/dashboard?issue_id=I94VOL
> kernel 6.7 #I94VOT:CVE-2021-47060<
https://gitee.com/open_euler/dashboard?issue_id=I94VOT
> kernel 6.7 #I95ASM:CVE-2023-52510<
https://gitee.com/open_euler/dashboard?issue_id=I95ASM
> kernel 6.7 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I94PA7:CVE-2023-52475<
https://gitee.com/open_euler/dashboard?issue_id=I94PA7
> kernel 6.3 #I96DIN:CVE-2021-46984<
https://gitee.com/open_euler/dashboard?issue_id=I96DIN
> kernel 6 #I9AYAQ:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ
> libssh2 5.9 #I9F9VB:CVE-2024-2511<
https://gitee.com/open_euler/dashboard?issue_id=I9F9VB
> edk2 5.9 #I95B1K:CVE-2023-52507<
https://gitee.com/open_euler/dashboard?issue_id=I95B1K
> kernel 5.7 #I949AL:CVE-2024-21742<
https://gitee.com/open_euler/dashboard?issue_id=I949AL
> apache-mime4j 5.6 #I94VOZ:CVE-2021-47056<
https://gitee.com/open_euler/dashboard?issue_id=I94VOZ
> kernel 5.5 #I956G7:CVE-2021-47074<
https://gitee.com/open_euler/dashboard?issue_id=I956G7
> kernel 5.5 #I956GH:CVE-2021-47071<
https://gitee.com/open_euler/dashboard?issue_id=I956GH
> kernel 5.5 #I956GS:CVE-2021-47077<
https://gitee.com/open_euler/dashboard?issue_id=I956GS
> kernel 5.5 #I95AT0:CVE-2023-52504<
https://gitee.com/open_euler/dashboard?issue_id=I95AT0
> kernel 5.5 #I95AT5:CVE-2023-52566<
https://gitee.com/open_euler/dashboard?issue_id=I95AT5
> kernel 5.5 #I95ATV:CVE-2023-52578<
https://gitee.com/open_euler/dashboard?issue_id=I95ATV
> kernel 5.5 #I95AWK:CVE-2023-52522<
https://gitee.com/open_euler/dashboard?issue_id=I95AWK
> kernel 5.5 #I95B1O:CVE-2023-52515<
https://gitee.com/open_euler/dashboard?issue_id=I95B1O
> kernel 5.5 #I96G7Q:CVE-2023-52598<
https://gitee.com/open_euler/dashboard?issue_id=I96G7Q
> kernel 5.5 #I96G92:CVE-2023-52583<
https://gitee.com/open_euler/dashboard?issue_id=I96G92
> kernel 5.5 #I9BGUB:CVE-2021-47142<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUB
> kernel 5.5 #I9BGMR:CVE-2021-47143<
https://gitee.com/open_euler/dashboard?issue_id=I9BGMR
> kernel 5.5 #I9BGQL:CVE-2021-47145<
https://gitee.com/open_euler/dashboard?issue_id=I9BGQL
> kernel 5.5 #I9BGUR:CVE-2021-47144<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUR
> kernel 5.5 #I9BGV4:CVE-2021-47146<
https://gitee.com/open_euler/dashboard?issue_id=I9BGV4
> kernel 5.5 #I9BGWP:CVE-2021-47153<
https://gitee.com/open_euler/dashboard?issue_id=I9BGWP
> kernel 5.5 #I9BHF9:CVE-2021-47162<
https://gitee.com/open_euler/dashboard?issue_id=I9BHF9
> kernel 5.5 #I9BHG2:CVE-2021-47160<
https://gitee.com/open_euler/dashboard?issue_id=I9BHG2
> kernel 5.5 #I9BHQL:CVE-2021-47170<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQL
> kernel 5.5 #I9BHRY:CVE-2021-47163<
https://gitee.com/open_euler/dashboard?issue_id=I9BHRY
> kernel 5.5 #I9BHSG:CVE-2021-47159<
https://gitee.com/open_euler/dashboard?issue_id=I9BHSG
> kernel 5.5 #I9BHN7:CVE-2021-47161<
https://gitee.com/open_euler/dashboard?issue_id=I9BHN7
> kernel 5.5 #I9BHTI:CVE-2021-47167<
https://gitee.com/open_euler/dashboard?issue_id=I9BHTI
> kernel 5.5 #I9BHNM:CVE-2021-47171<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNM
> kernel 5.5 #I9BHNX:CVE-2021-47173<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNX
> kernel 5.5 #I9BHQ7:CVE-2021-47180<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7
> kernel 5.5 #I956GP:CVE-2021-47078<
https://gitee.com/open_euler/dashboard?issue_id=I956GP
> kernel 5.3 #I94JR1:CVE-2020-36783<
https://gitee.com/open_euler/dashboard?issue_id=I94JR1
> kernel 4.7 #I96G7W:CVE-2023-52594<
https://gitee.com/open_euler/dashboard?issue_id=I96G7W
> kernel 4.4 #I9BV4P:CVE-2023-52622<
https://gitee.com/open_euler/dashboard?issue_id=I9BV4P
> kernel 4.4 #I95B2S:CVE-2023-52500<
https://gitee.com/open_euler/dashboard?issue_id=I95B2S
> kernel 3.3 #I94VOR:CVE-2021-47054<
https://gitee.com/open_euler/dashboard?issue_id=I94VOR
> kernel 2.3 #I9C0U4:CVE-2023-46049<
https://gitee.com/open_euler/dashboard?issue_id=I9C0U4
> llvm 2 #I9FNG2:CVE-2021-47194<
https://gitee.com/open_euler/dashboard?issue_id=I9FNG2
> kernel 1 #I9FNG0:CVE-2021-47201<
https://gitee.com/open_euler/dashboard?issue_id=I9FNG0
> kernel 1 #I9DNGK:CVE-2023-52635<
https://gitee.com/open_euler/dashboard?issue_id=I9DNGK
> kernel 1 #I9E2H0:CVE-2023-52637<
https://gitee.com/open_euler/dashboard?issue_id=I9E2H0
> kernel 1 #I9E2GQ:CVE-2023-52639<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ
> kernel 1 #I9E2FP:CVE-2024-26685<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FP
> kernel 1 #I9E2EL:CVE-2024-26686<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EL
> kernel 1 #I9E2GS:CVE-2024-26687<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GS
> kernel 1 #I9E2EQ:CVE-2024-26696<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ
> kernel 1 #I9E2FH:CVE-2024-26697<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FH
> kernel 1 #I9E2F9:CVE-2024-26704<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F9
> kernel 1 #I9E2F7:CVE-2024-26726<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F7
> kernel 1 #I9E3E4:CVE-2024-26735<
https://gitee.com/open_euler/dashboard?issue_id=I9E3E4
> kernel 1 #I9E2LZ:CVE-2024-26739<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ
> kernel 1 #I9E2LT:CVE-2024-26740<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LT
> kernel 1 #I9E2M7:CVE-2024-26743<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M7
> kernel 1 #I9E3EE:CVE-2024-26744<
https://gitee.com/open_euler/dashboard?issue_id=I9E3EE
> kernel 1 #I9E2MH:CVE-2024-26754<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MH
> kernel 1 #I9E2M2:CVE-2024-26759<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M2
> kernel 1 #I9E2LW:CVE-2024-26763<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LW
> kernel 1 #I9E2MP:CVE-2024-26771<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MP
> kernel 1 #I9E2MF:CVE-2024-26772<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MF
> kernel 1 #I9E2M9:CVE-2024-26773<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M9
> kernel 1 #I9E2MG:CVE-2024-26777<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MG
> kernel 1 #I9E2Y8:CVE-2024-26778<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8
> kernel 1 #I9E2MI:CVE-2024-26779<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MI
> kernel 1 #I9E469:CVE-2024-26791<
https://gitee.com/open_euler/dashboard?issue_id=I9E469
> kernel 1 #I9E47C:CVE-2024-26804<
https://gitee.com/open_euler/dashboard?issue_id=I9E47C
> kernel 1 #I9E6TS:CVE-2024-26810<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TS
> kernel 1 #I9E6TE:CVE-2024-26812<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TE
> kernel 1 #I9E6TU:CVE-2024-27437<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TU
> kernel 1 Bugfix: issue 仓库 #I97R4T:【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启<
https://gitee.com/open_euler/dashboard?issue_id=I97R4T
> kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1 I3QGU7 系统不支持GB18030 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926 I4CMSV 【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 无优先级 sig/sig-mate-desktop src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240417 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞44个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLS7?from=project-i…
CVE修复: CVE 仓库 score I9E2PR:CVE-2023-45288<
https://gitee.com/src-openeuler/golang/issues/I9E2PR
> golang 7.5 I95ASM:CVE-2023-52510<
https://gitee.com/src-openeuler/kernel/issues/I95ASM
> kernel 6.7 I94PA7:CVE-2023-52475<
https://gitee.com/src-openeuler/kernel/issues/I94PA7
> kernel 6.3 I9AYAQ:CVE-2023-48795<
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
> libssh2 5.9 I9A82U:CVE-2024-29018<
https://gitee.com/src-openeuler/docker/issues/I9A82U
> docker 5.9 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I95B1K:CVE-2023-52507<
https://gitee.com/src-openeuler/kernel/issues/I95B1K
> kernel 5.7 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95AT5:CVE-2023-52566<
https://gitee.com/src-openeuler/kernel/issues/I95AT5
> kernel 5.5 I95ATK:CVE-2023-52573<
https://gitee.com/src-openeuler/kernel/issues/I95ATK
> kernel 5.5 I95ATV:CVE-2023-52578<
https://gitee.com/src-openeuler/kernel/issues/I95ATV
> kernel 5.5 I95AWK:CVE-2023-52522<
https://gitee.com/src-openeuler/kernel/issues/I95AWK
> kernel 5.5 I95B1O:CVE-2023-52515<
https://gitee.com/src-openeuler/kernel/issues/I95B1O
> kernel 5.5 I96G7Q:CVE-2023-52598<
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
> kernel 5.5 I96G92:CVE-2023-52583<
https://gitee.com/src-openeuler/kernel/issues/I96G92
> kernel 5.5 I93EBW:CVE-2023-52464<
https://gitee.com/src-openeuler/kernel/issues/I93EBW
> kernel 5.5 I956G4:CVE-2021-47070<
https://gitee.com/src-openeuler/kernel/issues/I956G4
> kernel 5.5 I95ASP:CVE-2023-52530<
https://gitee.com/src-openeuler/kernel/issues/I95ASP
> kernel 5.5 I95ATF:CVE-2023-52561<
https://gitee.com/src-openeuler/kernel/issues/I95ATF
> kernel 5.5 I95ATG:CVE-2023-52560<
https://gitee.com/src-openeuler/kernel/issues/I95ATG
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95AXL:CVE-2023-52516<
https://gitee.com/src-openeuler/kernel/issues/I95AXL
> kernel 5.5 I96G8W:CVE-2023-52587<
https://gitee.com/src-openeuler/kernel/issues/I96G8W
> kernel 4.7 I96GPO:CVE-2023-52597<
https://gitee.com/src-openeuler/kernel/issues/I96GPO
> kernel 4.7 I96G7W:CVE-2023-52594<
https://gitee.com/src-openeuler/kernel/issues/I96G7W
> kernel 4.4 I9BV4P:CVE-2023-52622<
https://gitee.com/src-openeuler/kernel/issues/I9BV4P
> kernel 4.4 I96GO9:CVE-2023-52595<
https://gitee.com/src-openeuler/kernel/issues/I96GO9
> kernel 4.4 I95AUA:CVE-2023-52572<
https://gitee.com/src-openeuler/kernel/issues/I95AUA
> kernel 4 I95RDW:CVE-2021-47101<
https://gitee.com/src-openeuler/kernel/issues/I95RDW
> kernel 4 I95B2S:CVE-2023-52500<
https://gitee.com/src-openeuler/kernel/issues/I95B2S
> kernel 3.3 I9C0U4:CVE-2023-46049<
https://gitee.com/src-openeuler/llvm/issues/I9C0U4
> llvm 2 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 1 I9E2FM:CVE-2024-26695<
https://gitee.com/src-openeuler/kernel/issues/I9E2FM
> kernel 1 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 1 I9E2M2:CVE-2024-26759<
https://gitee.com/src-openeuler/kernel/issues/I9E2M2
> kernel 1 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 1 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 1 I9E2MP:CVE-2024-26771<
https://gitee.com/src-openeuler/kernel/issues/I9E2MP
> kernel 1 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 1 I9E2O5:CVE-2023-52640<
https://gitee.com/src-openeuler/kernel/issues/I9E2O5
> kernel 1 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 1 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 1 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 1 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 1 Bugfix: issue 仓库 #I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。 oec-hardware #I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream kernel #I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream kernel #I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误 kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS update20230726 I7ORCE 【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild I5RTUS X86架构下无法对mysql8进行autobolt模式反馈编译,报错 无优先级 sig/Compiler,kind/feature src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild I5XP8E Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild I65UF9 aarch64架构boost icl模板库优化错误 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240417 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞49个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLT4?from=project-i…
CVE修复: CVE 仓库 score I9E2PR:CVE-2023-45288<
https://gitee.com/src-openeuler/golang/issues/I9E2PR
> golang 7.5 I95ASM:CVE-2023-52510<
https://gitee.com/src-openeuler/kernel/issues/I95ASM
> kernel 6.7 I94PA7:CVE-2023-52475<
https://gitee.com/src-openeuler/kernel/issues/I94PA7
> kernel 6.3 I9A82U:CVE-2024-29018<
https://gitee.com/src-openeuler/docker/issues/I9A82U
> docker 5.9 I9AYAQ:CVE-2023-48795<
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
> libssh2 5.9 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I95B1K:CVE-2023-52507<
https://gitee.com/src-openeuler/kernel/issues/I95B1K
> kernel 5.7 I949AL:CVE-2024-21742<
https://gitee.com/src-openeuler/apache-mime4j/issues/I949AL
> apache-mime4j 5.6 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95AT5:CVE-2023-52566<
https://gitee.com/src-openeuler/kernel/issues/I95AT5
> kernel 5.5 I95ATK:CVE-2023-52573<
https://gitee.com/src-openeuler/kernel/issues/I95ATK
> kernel 5.5 I95ATV:CVE-2023-52578<
https://gitee.com/src-openeuler/kernel/issues/I95ATV
> kernel 5.5 I95AWK:CVE-2023-52522<
https://gitee.com/src-openeuler/kernel/issues/I95AWK
> kernel 5.5 I95B1O:CVE-2023-52515<
https://gitee.com/src-openeuler/kernel/issues/I95B1O
> kernel 5.5 I96G7Q:CVE-2023-52598<
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
> kernel 5.5 I96G92:CVE-2023-52583<
https://gitee.com/src-openeuler/kernel/issues/I96G92
> kernel 5.5 I93EBW:CVE-2023-52464<
https://gitee.com/src-openeuler/kernel/issues/I93EBW
> kernel 5.5 I956G4:CVE-2021-47070<
https://gitee.com/src-openeuler/kernel/issues/I956G4
> kernel 5.5 I95ASP:CVE-2023-52530<
https://gitee.com/src-openeuler/kernel/issues/I95ASP
> kernel 5.5 I95ATF:CVE-2023-52561<
https://gitee.com/src-openeuler/kernel/issues/I95ATF
> kernel 5.5 I95ATG:CVE-2023-52560<
https://gitee.com/src-openeuler/kernel/issues/I95ATG
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95AXL:CVE-2023-52516<
https://gitee.com/src-openeuler/kernel/issues/I95AXL
> kernel 5.5 I96G8W:CVE-2023-52587<
https://gitee.com/src-openeuler/kernel/issues/I96G8W
> kernel 4.7 I96GPO:CVE-2023-52597<
https://gitee.com/src-openeuler/kernel/issues/I96GPO
> kernel 4.7 I96G7W:CVE-2023-52594<
https://gitee.com/src-openeuler/kernel/issues/I96G7W
> kernel 4.4 I9BV4P:CVE-2023-52622<
https://gitee.com/src-openeuler/kernel/issues/I9BV4P
> kernel 4.4 I96GO9:CVE-2023-52595<
https://gitee.com/src-openeuler/kernel/issues/I96GO9
> kernel 4.4 I9AFM6:CVE-2024-28835<
https://gitee.com/src-openeuler/gnutls/issues/I9AFM6
> gnutls 4.3 I9C55E:CVE-2024-28180<
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
> cri-o 4.3 I95ATJ:CVE-2023-52568<
https://gitee.com/src-openeuler/kernel/issues/I95ATJ
> kernel 4.1 I95AUA:CVE-2023-52572<
https://gitee.com/src-openeuler/kernel/issues/I95AUA
> kernel 4 I95RDW:CVE-2021-47101<
https://gitee.com/src-openeuler/kernel/issues/I95RDW
> kernel 4 I95B2S:CVE-2023-52500<
https://gitee.com/src-openeuler/kernel/issues/I95B2S
> kernel 3.3 I9A7Y2:CVE-2023-50967<
https://gitee.com/src-openeuler/jose/issues/I9A7Y2
> jose 2.5 I9C0U4:CVE-2023-46049<
https://gitee.com/src-openeuler/llvm/issues/I9C0U4
> llvm 2 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 1 I9E2FM:CVE-2024-26695<
https://gitee.com/src-openeuler/kernel/issues/I9E2FM
> kernel 1 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 1 I9E2M2:CVE-2024-26759<
https://gitee.com/src-openeuler/kernel/issues/I9E2M2
> kernel 1 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 1 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 1 I9E2MP:CVE-2024-26771<
https://gitee.com/src-openeuler/kernel/issues/I9E2MP
> kernel 1 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 1 I9E2O5:CVE-2023-52640<
https://gitee.com/src-openeuler/kernel/issues/I9E2O5
> kernel 1 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 1 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 1 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 1 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 1 Bugfix: issue 仓库 #I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。 oec-hardware #I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream kernel #I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream kernel #I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误 kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 22.03-SP1 I6B4V1 【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1 I84L9F openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240417 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题6个,已知漏洞50个,热补丁1个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLQ3?from=project-i…
CVE修复: CVE 仓库 score I9C6X1:CVE-2024-3019<
https://gitee.com/src-openeuler/pcp/issues/I9C6X1
> pcp 8.8 I9AVYL:CVE-2022-48279<
https://gitee.com/src-openeuler/mod_security/issues/I9AVYL
> mod_security 7.5 I9E2PR:CVE-2023-45288<
https://gitee.com/src-openeuler/golang/issues/I9E2PR
> golang 7.5 I95ASM:CVE-2023-52510<
https://gitee.com/src-openeuler/kernel/issues/I95ASM
> kernel 6.7 I94PA7:CVE-2023-52475<
https://gitee.com/src-openeuler/kernel/issues/I94PA7
> kernel 6.3 I9AYAQ:CVE-2023-48795<
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
> libssh2 5.9 I9A82U:CVE-2024-29018<
https://gitee.com/src-openeuler/docker/issues/I9A82U
> docker 5.9 I9F9VB:CVE-2024-2511<
https://gitee.com/src-openeuler/edk2/issues/I9F9VB
> edk2 5.9 I95B1K:CVE-2023-52507<
https://gitee.com/src-openeuler/kernel/issues/I95B1K
> kernel 5.7 I93HD9:CVE-2024-26601<
https://gitee.com/src-openeuler/kernel/issues/I93HD9
> kernel 5.5 I95AT0:CVE-2023-52504<
https://gitee.com/src-openeuler/kernel/issues/I95AT0
> kernel 5.5 I95AT5:CVE-2023-52566<
https://gitee.com/src-openeuler/kernel/issues/I95AT5
> kernel 5.5 I95ATK:CVE-2023-52573<
https://gitee.com/src-openeuler/kernel/issues/I95ATK
> kernel 5.5 I95ATV:CVE-2023-52578<
https://gitee.com/src-openeuler/kernel/issues/I95ATV
> kernel 5.5 I95AWK:CVE-2023-52522<
https://gitee.com/src-openeuler/kernel/issues/I95AWK
> kernel 5.5 I95B1O:CVE-2023-52515<
https://gitee.com/src-openeuler/kernel/issues/I95B1O
> kernel 5.5 I96G7Q:CVE-2023-52598<
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
> kernel 5.5 I96G92:CVE-2023-52583<
https://gitee.com/src-openeuler/kernel/issues/I96G92
> kernel 5.5 I93EBW:CVE-2023-52464<
https://gitee.com/src-openeuler/kernel/issues/I93EBW
> kernel 5.5 I956G4:CVE-2021-47070<
https://gitee.com/src-openeuler/kernel/issues/I956G4
> kernel 5.5 I95ASP:CVE-2023-52530<
https://gitee.com/src-openeuler/kernel/issues/I95ASP
> kernel 5.5 I95AT9:CVE-2023-52575<
https://gitee.com/src-openeuler/kernel/issues/I95AT9
> kernel 5.5 I95ATF:CVE-2023-52561<
https://gitee.com/src-openeuler/kernel/issues/I95ATF
> kernel 5.5 I95ATG:CVE-2023-52560<
https://gitee.com/src-openeuler/kernel/issues/I95ATG
> kernel 5.5 I95ATZ:CVE-2023-52574<
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
> kernel 5.5 I95AXL:CVE-2023-52516<
https://gitee.com/src-openeuler/kernel/issues/I95AXL
> kernel 5.5 I96G8W:CVE-2023-52587<
https://gitee.com/src-openeuler/kernel/issues/I96G8W
> kernel 4.7 I96GPO:CVE-2023-52597<
https://gitee.com/src-openeuler/kernel/issues/I96GPO
> kernel 4.7 I96G7W:CVE-2023-52594<
https://gitee.com/src-openeuler/kernel/issues/I96G7W
> kernel 4.4 I9BV4P:CVE-2023-52622<
https://gitee.com/src-openeuler/kernel/issues/I9BV4P
> kernel 4.4 I96GO9:CVE-2023-52595<
https://gitee.com/src-openeuler/kernel/issues/I96GO9
> kernel 4.4 I95ATJ:CVE-2023-52568<
https://gitee.com/src-openeuler/kernel/issues/I95ATJ
> kernel 4.1 I95AUA:CVE-2023-52572<
https://gitee.com/src-openeuler/kernel/issues/I95AUA
> kernel 4 I95RDW:CVE-2021-47101<
https://gitee.com/src-openeuler/kernel/issues/I95RDW
> kernel 4 I95B2S:CVE-2023-52500<
https://gitee.com/src-openeuler/kernel/issues/I95B2S
> kernel 3.3 I95ATO:CVE-2023-52567<
https://gitee.com/src-openeuler/kernel/issues/I95ATO
> kernel 2.3 I9C0U4:CVE-2023-46049<
https://gitee.com/src-openeuler/llvm/issues/I9C0U4
> llvm 2 I9DO1Z:CVE-2024-26656<
https://gitee.com/src-openeuler/kernel/issues/I9DO1Z
> kernel 1 I9E2FM:CVE-2024-26695<
https://gitee.com/src-openeuler/kernel/issues/I9E2FM
> kernel 1 I9E2GU:CVE-2024-26698<
https://gitee.com/src-openeuler/kernel/issues/I9E2GU
> kernel 1 I9E2M2:CVE-2024-26759<
https://gitee.com/src-openeuler/kernel/issues/I9E2M2
> kernel 1 I9E2MF:CVE-2024-26772<
https://gitee.com/src-openeuler/kernel/issues/I9E2MF
> kernel 1 I9E2MG:CVE-2024-26777<
https://gitee.com/src-openeuler/kernel/issues/I9E2MG
> kernel 1 I9E2MP:CVE-2024-26771<
https://gitee.com/src-openeuler/kernel/issues/I9E2MP
> kernel 1 I9E2O0:CVE-2024-26751<
https://gitee.com/src-openeuler/kernel/issues/I9E2O0
> kernel 1 I9E2O5:CVE-2023-52640<
https://gitee.com/src-openeuler/kernel/issues/I9E2O5
> kernel 1 I9E2Y8:CVE-2024-26778<
https://gitee.com/src-openeuler/kernel/issues/I9E2Y8
> kernel 1 I9E3E9:CVE-2024-26736<
https://gitee.com/src-openeuler/kernel/issues/I9E3E9
> kernel 1 I9E6TS:CVE-2024-26810<
https://gitee.com/src-openeuler/kernel/issues/I9E6TS
> kernel 1 I9E6TU:CVE-2024-27437<
https://gitee.com/src-openeuler/kernel/issues/I9E6TU
> kernel 1 Bugfix: issue 仓库 #I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。 oec-hardware #I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream kernel #I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream kernel #I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降 kernel #I9EEIG:smmu_v3 ecmdq代码逻辑存在问题:smmu_v3 ecmdq代码逻辑存在问题 kernel #I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误 kernel 热补丁: 仓库 CVE score kernel CVE-2024-0841 7.8 openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 主要 sig/sig-CloudNative src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 主要 sig-AccLib src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018 I89NB0 22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本 次要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2 I7B6X5 gcc-pie-arm64架构和操作手册结果不同 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240417 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题2个,已知漏洞81个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHR?from=project-i…
CVE修复: CVE 仓库 score #I91349:CVE-2020-36773<
https://gitee.com/open_euler/dashboard?issue_id=I91349
> ghostscript 9.8 #I990AF:CVE-2021-47131<
https://gitee.com/open_euler/dashboard?issue_id=I990AF
> kernel 7.8 #I9E2PR:CVE-2023-45288<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PR
> golang 7.5 #I95AXP:CVE-2023-52502<
https://gitee.com/open_euler/dashboard?issue_id=I95AXP
> kernel 7 #I94VO4:CVE-2021-47061<
https://gitee.com/open_euler/dashboard?issue_id=I94VO4
> kernel 6.7 #I94VOL:CVE-2021-47063<
https://gitee.com/open_euler/dashboard?issue_id=I94VOL
> kernel 6.7 #I94VOT:CVE-2021-47060<
https://gitee.com/open_euler/dashboard?issue_id=I94VOT
> kernel 6.7 #I95ASM:CVE-2023-52510<
https://gitee.com/open_euler/dashboard?issue_id=I95ASM
> kernel 6.7 #I94PA7:CVE-2023-52475<
https://gitee.com/open_euler/dashboard?issue_id=I94PA7
> kernel 6.3 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I96DIN:CVE-2021-46984<
https://gitee.com/open_euler/dashboard?issue_id=I96DIN
> kernel 6 #I9AYAQ:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ
> libssh2 5.9 #I9A82U:CVE-2024-29018<
https://gitee.com/open_euler/dashboard?issue_id=I9A82U
> docker 5.9 #I9F9VB:CVE-2024-2511<
https://gitee.com/open_euler/dashboard?issue_id=I9F9VB
> edk2 5.9 #I95B1K:CVE-2023-52507<
https://gitee.com/open_euler/dashboard?issue_id=I95B1K
> kernel 5.7 #I97N53:CVE-2024-1441<
https://gitee.com/open_euler/dashboard?issue_id=I97N53
> libvirt 5.5 #I94VOZ:CVE-2021-47056<
https://gitee.com/open_euler/dashboard?issue_id=I94VOZ
> kernel 5.5 #I956G7:CVE-2021-47074<
https://gitee.com/open_euler/dashboard?issue_id=I956G7
> kernel 5.5 #I956GH:CVE-2021-47071<
https://gitee.com/open_euler/dashboard?issue_id=I956GH
> kernel 5.5 #I956GS:CVE-2021-47077<
https://gitee.com/open_euler/dashboard?issue_id=I956GS
> kernel 5.5 #I95AT0:CVE-2023-52504<
https://gitee.com/open_euler/dashboard?issue_id=I95AT0
> kernel 5.5 #I95AT5:CVE-2023-52566<
https://gitee.com/open_euler/dashboard?issue_id=I95AT5
> kernel 5.5 #I95ATV:CVE-2023-52578<
https://gitee.com/open_euler/dashboard?issue_id=I95ATV
> kernel 5.5 #I95AWK:CVE-2023-52522<
https://gitee.com/open_euler/dashboard?issue_id=I95AWK
> kernel 5.5 #I95B1O:CVE-2023-52515<
https://gitee.com/open_euler/dashboard?issue_id=I95B1O
> kernel 5.5 #I96G7Q:CVE-2023-52598<
https://gitee.com/open_euler/dashboard?issue_id=I96G7Q
> kernel 5.5 #I96G92:CVE-2023-52583<
https://gitee.com/open_euler/dashboard?issue_id=I96G92
> kernel 5.5 #I9BGUB:CVE-2021-47142<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUB
> kernel 5.5 #I9BGMR:CVE-2021-47143<
https://gitee.com/open_euler/dashboard?issue_id=I9BGMR
> kernel 5.5 #I9BGQL:CVE-2021-47145<
https://gitee.com/open_euler/dashboard?issue_id=I9BGQL
> kernel 5.5 #I9BGUR:CVE-2021-47144<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUR
> kernel 5.5 #I9BGV4:CVE-2021-47146<
https://gitee.com/open_euler/dashboard?issue_id=I9BGV4
> kernel 5.5 #I9BGWP:CVE-2021-47153<
https://gitee.com/open_euler/dashboard?issue_id=I9BGWP
> kernel 5.5 #I9BHF9:CVE-2021-47162<
https://gitee.com/open_euler/dashboard?issue_id=I9BHF9
> kernel 5.5 #I9BHG2:CVE-2021-47160<
https://gitee.com/open_euler/dashboard?issue_id=I9BHG2
> kernel 5.5 #I9BHQL:CVE-2021-47170<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQL
> kernel 5.5 #I9BHRY:CVE-2021-47163<
https://gitee.com/open_euler/dashboard?issue_id=I9BHRY
> kernel 5.5 #I9BHSG:CVE-2021-47159<
https://gitee.com/open_euler/dashboard?issue_id=I9BHSG
> kernel 5.5 #I9BHN7:CVE-2021-47161<
https://gitee.com/open_euler/dashboard?issue_id=I9BHN7
> kernel 5.5 #I9BHTI:CVE-2021-47167<
https://gitee.com/open_euler/dashboard?issue_id=I9BHTI
> kernel 5.5 #I9BHNM:CVE-2021-47171<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNM
> kernel 5.5 #I9BHNX:CVE-2021-47173<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNX
> kernel 5.5 #I9BHQ7:CVE-2021-47180<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7
> kernel 5.5 #I956GP:CVE-2021-47078<
https://gitee.com/open_euler/dashboard?issue_id=I956GP
> kernel 5.3 #I94JR1:CVE-2020-36783<
https://gitee.com/open_euler/dashboard?issue_id=I94JR1
> kernel 4.7 #I96G7W:CVE-2023-52594<
https://gitee.com/open_euler/dashboard?issue_id=I96G7W
> kernel 4.4 #I9BV4P:CVE-2023-52622<
https://gitee.com/open_euler/dashboard?issue_id=I9BV4P
> kernel 4.4 #I95B2S:CVE-2023-52500<
https://gitee.com/open_euler/dashboard?issue_id=I95B2S
> kernel 3.3 #I94VOR:CVE-2021-47054<
https://gitee.com/open_euler/dashboard?issue_id=I94VOR
> kernel 2.3 #I9C0U4:CVE-2023-46049<
https://gitee.com/open_euler/dashboard?issue_id=I9C0U4
> llvm 2 #I9FNG2:CVE-2021-47194<
https://gitee.com/open_euler/dashboard?issue_id=I9FNG2
> kernel 1 #I9FNG0:CVE-2021-47201<
https://gitee.com/open_euler/dashboard?issue_id=I9FNG0
> kernel 1 #I9DNGK:CVE-2023-52635<
https://gitee.com/open_euler/dashboard?issue_id=I9DNGK
> kernel 1 #I9E2H0:CVE-2023-52637<
https://gitee.com/open_euler/dashboard?issue_id=I9E2H0
> kernel 1 #I9E2GQ:CVE-2023-52639<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ
> kernel 1 #I9E2FP:CVE-2024-26685<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FP
> kernel 1 #I9E2EL:CVE-2024-26686<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EL
> kernel 1 #I9E2GS:CVE-2024-26687<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GS
> kernel 1 #I9E2EQ:CVE-2024-26696<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ
> kernel 1 #I9E2FH:CVE-2024-26697<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FH
> kernel 1 #I9E2F9:CVE-2024-26704<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F9
> kernel 1 #I9E2F7:CVE-2024-26726<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F7
> kernel 1 #I9E3E4:CVE-2024-26735<
https://gitee.com/open_euler/dashboard?issue_id=I9E3E4
> kernel 1 #I9E2LZ:CVE-2024-26739<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ
> kernel 1 #I9E2LT:CVE-2024-26740<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LT
> kernel 1 #I9E2M7:CVE-2024-26743<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M7
> kernel 1 #I9E3EE:CVE-2024-26744<
https://gitee.com/open_euler/dashboard?issue_id=I9E3EE
> kernel 1 #I9E2MH:CVE-2024-26754<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MH
> kernel 1 #I9E2M2:CVE-2024-26759<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M2
> kernel 1 #I9E2LW:CVE-2024-26763<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LW
> kernel 1 #I9E2MP:CVE-2024-26771<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MP
> kernel 1 #I9E2MF:CVE-2024-26772<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MF
> kernel 1 #I9E2M9:CVE-2024-26773<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M9
> kernel 1 #I9E2MG:CVE-2024-26777<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MG
> kernel 1 #I9E2Y8:CVE-2024-26778<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8
> kernel 1 #I9E2MI:CVE-2024-26779<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MI
> kernel 1 #I9E469:CVE-2024-26791<
https://gitee.com/open_euler/dashboard?issue_id=I9E469
> kernel 1 #I9E47C:CVE-2024-26804<
https://gitee.com/open_euler/dashboard?issue_id=I9E47C
> kernel 1 #I9E6TS:CVE-2024-26810<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TS
> kernel 1 #I9E6TE:CVE-2024-26812<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TE
> kernel 1 #I9E6TU:CVE-2024-27437<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TU
> kernel 1 Bugfix: issue 仓库 #I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。<
https://gitee.com/open_euler/dashboard?issue_id=I9HBFR
> oec-hardware #I97R4T:【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启<
https://gitee.com/open_euler/dashboard?issue_id=I97R4T
> kernel openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-20.03-LTS-SP4-round-1 I8DT5M 【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败 主要 sig/bigdata src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1 I8EKUI 【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败 主要 sig/sig-security-fac src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2 I8GDGR 【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住 主要 sig/GNOME src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha I8B7XU 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 主要 sig/oVirt src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2 I8G371 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 次要 sig/DB src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild I8GUMP [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything 不重要 sig/Networking src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild I8I8DQ [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol 不重要 sig/sig-mate-desktop src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240417 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题13个,已知漏洞70个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHG?from=project-i…
CVE修复: CVE 仓库 score #I9E2PR:CVE-2023-45288<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PR
> golang 7.5 #I95ASM:CVE-2023-52510<
https://gitee.com/open_euler/dashboard?issue_id=I95ASM
> kernel 6.7 #I94PA7:CVE-2023-52475<
https://gitee.com/open_euler/dashboard?issue_id=I94PA7
> kernel 6.3 #I9AYAQ:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ
> libssh2 5.9 #I9A82U:CVE-2024-29018<
https://gitee.com/open_euler/dashboard?issue_id=I9A82U
> docker 5.9 #I95B1K:CVE-2023-52507<
https://gitee.com/open_euler/dashboard?issue_id=I95B1K
> kernel 5.7 #I93HD9:CVE-2024-26601<
https://gitee.com/open_euler/dashboard?issue_id=I93HD9
> kernel 5.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 5.5 #I95AT5:CVE-2023-52566<
https://gitee.com/open_euler/dashboard?issue_id=I95AT5
> kernel 5.5 #I95ATK:CVE-2023-52573<
https://gitee.com/open_euler/dashboard?issue_id=I95ATK
> kernel 5.5 #I95ATV:CVE-2023-52578<
https://gitee.com/open_euler/dashboard?issue_id=I95ATV
> kernel 5.5 #I95AWK:CVE-2023-52522<
https://gitee.com/open_euler/dashboard?issue_id=I95AWK
> kernel 5.5 #I95B1O:CVE-2023-52515<
https://gitee.com/open_euler/dashboard?issue_id=I95B1O
> kernel 5.5 #I96G7Q:CVE-2023-52598<
https://gitee.com/open_euler/dashboard?issue_id=I96G7Q
> kernel 5.5 #I96G92:CVE-2023-52583<
https://gitee.com/open_euler/dashboard?issue_id=I96G92
> kernel 5.5 #I93EBW:CVE-2023-52464<
https://gitee.com/open_euler/dashboard?issue_id=I93EBW
> kernel 5.5 #I956G4:CVE-2021-47070<
https://gitee.com/open_euler/dashboard?issue_id=I956G4
> kernel 5.5 #I95ATF:CVE-2023-52561<
https://gitee.com/open_euler/dashboard?issue_id=I95ATF
> kernel 5.5 #I95ATG:CVE-2023-52560<
https://gitee.com/open_euler/dashboard?issue_id=I95ATG
> kernel 5.5 #I96G8W:CVE-2023-52587<
https://gitee.com/open_euler/dashboard?issue_id=I96G8W
> kernel 4.7 #I96G7W:CVE-2023-52594<
https://gitee.com/open_euler/dashboard?issue_id=I96G7W
> kernel 4.4 #I9BV4P:CVE-2023-52622<
https://gitee.com/open_euler/dashboard?issue_id=I9BV4P
> kernel 4.4 #I96GO9:CVE-2023-52595<
https://gitee.com/open_euler/dashboard?issue_id=I96GO9
> kernel 4.4 #I95ATJ:CVE-2023-52568<
https://gitee.com/open_euler/dashboard?issue_id=I95ATJ
> kernel 4.1 #I95AT6:CVE-2023-52577<
https://gitee.com/open_euler/dashboard?issue_id=I95AT6
> kernel 4 #I95AXH:CVE-2023-52525<
https://gitee.com/open_euler/dashboard?issue_id=I95AXH
> kernel 4 #I95AUA:CVE-2023-52572<
https://gitee.com/open_euler/dashboard?issue_id=I95AUA
> kernel 4 #I95B2S:CVE-2023-52500<
https://gitee.com/open_euler/dashboard?issue_id=I95B2S
> kernel 3.3 #I9C0U4:CVE-2023-46049<
https://gitee.com/open_euler/dashboard?issue_id=I9C0U4
> llvm 2 #I9DNKF:CVE-2024-26669<
https://gitee.com/open_euler/dashboard?issue_id=I9DNKF
> kernel 1 #I9DNVF:CVE-2024-26665<
https://gitee.com/open_euler/dashboard?issue_id=I9DNVF
> kernel 1 #I9DNXE:CVE-2023-52631<
https://gitee.com/open_euler/dashboard?issue_id=I9DNXE
> kernel 1 #I9DNZK:CVE-2024-26684<
https://gitee.com/open_euler/dashboard?issue_id=I9DNZK
> kernel 1 #I9DO1Z:CVE-2024-26656<
https://gitee.com/open_euler/dashboard?issue_id=I9DO1Z
> kernel 1 #I9E2EC:CVE-2024-26720<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EC
> kernel 1 #I9E2F7:CVE-2024-26726<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F7
> kernel 1 #I9E2F9:CVE-2024-26704<
https://gitee.com/open_euler/dashboard?issue_id=I9E2F9
> kernel 1 #I9E2FH:CVE-2024-26697<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FH
> kernel 1 #I9E2FK:CVE-2024-26707<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FK
> kernel 1 #I9E2FM:CVE-2024-26695<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FM
> kernel 1 #I9E2FP:CVE-2024-26685<
https://gitee.com/open_euler/dashboard?issue_id=I9E2FP
> kernel 1 #I9E2GN:CVE-2024-26689<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GN
> kernel 1 #I9E2GP:CVE-2024-26706<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GP
> kernel 1 #I9E2GQ:CVE-2023-52639<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ
> kernel 1 #I9E2GS:CVE-2024-26687<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GS
> kernel 1 #I9E2GU:CVE-2024-26698<
https://gitee.com/open_euler/dashboard?issue_id=I9E2GU
> kernel 1 #I9E2LT:CVE-2024-26740<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LT
> kernel 1 #I9E2LW:CVE-2024-26763<
https://gitee.com/open_euler/dashboard?issue_id=I9E2LW
> kernel 1 #I9E2M2:CVE-2024-26759<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M2
> kernel 1 #I9E2M7:CVE-2024-26743<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M7
> kernel 1 #I9E2M9:CVE-2024-26773<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M9
> kernel 1 #I9E2MF:CVE-2024-26772<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MF
> kernel 1 #I9E2MH:CVE-2024-26754<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MH
> kernel 1 #I9E2MI:CVE-2024-26779<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MI
> kernel 1 #I9E2MP:CVE-2024-26771<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MP
> kernel 1 #I9E2O0:CVE-2024-26751<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O0
> kernel 1 #I9E2O5:CVE-2023-52640<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O5
> kernel 1 #I9E2Y3:CVE-2024-26766<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Y3
> kernel 1 #I9E2Y8:CVE-2024-26778<
https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8
> kernel 1 #I9E3E4:CVE-2024-26735<
https://gitee.com/open_euler/dashboard?issue_id=I9E3E4
> kernel 1 #I9E3E9:CVE-2024-26736<
https://gitee.com/open_euler/dashboard?issue_id=I9E3E9
> kernel 1 #I9E3EE:CVE-2024-26744<
https://gitee.com/open_euler/dashboard?issue_id=I9E3EE
> kernel 1 #I9E442:CVE-2024-26782<
https://gitee.com/open_euler/dashboard?issue_id=I9E442
> kernel 1 #I9E461:CVE-2024-26787<
https://gitee.com/open_euler/dashboard?issue_id=I9E461
> kernel 1 #I9E466:CVE-2024-26795<
https://gitee.com/open_euler/dashboard?issue_id=I9E466
> kernel 1 #I9E469:CVE-2024-26791<
https://gitee.com/open_euler/dashboard?issue_id=I9E469
> kernel 1 #I9E4AC:CVE-2024-26809<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AC
> kernel 1 #I9E6TE:CVE-2024-26812<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TE
> kernel 1 #I9E6TS:CVE-2024-26810<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TS
> kernel 1 #I9E6TU:CVE-2024-27437<
https://gitee.com/open_euler/dashboard?issue_id=I9E6TU
> kernel 1 Bugfix: issue 仓库 #I9GMBA:回合社区bugfix补丁<
https://gitee.com/open_euler/dashboard?issue_id=I9GMBA
> libpsl #I9H5S1:回合社区bugfix补丁<
https://gitee.com/open_euler/dashboard?issue_id=I9H5S1
> abseil-cpp #I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。<
https://gitee.com/open_euler/dashboard?issue_id=I9HBFR
> oec-hardware #I9HDFB:libdnf Modify loongarch64 patch use all arch<
https://gitee.com/open_euler/dashboard?issue_id=I9HDFB
> libdnf #I8SCSA: 例行分析dnf补丁,需要回合补丁<
https://gitee.com/open_euler/dashboard?issue_id=I8SCSA
> dnf #I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<
https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ
> kernel #I93S0P:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性性能优化<
https://gitee.com/open_euler/dashboard?issue_id=I93S0P
> kernel #I96RWV:support the AMD Zen5 Turin<
https://gitee.com/open_euler/dashboard?issue_id=I96RWV
> kernel #I9CK2X:【OLK-5.10】Add Chengdu BeiZhongWangXin Technology N5/N6 Series Network Card Driver<
https://gitee.com/open_euler/dashboard?issue_id=I9CK2X
> kernel #I9DZOS:Backport 5.10.202 LTS patches from upstream<
https://gitee.com/open_euler/dashboard?issue_id=I9DZOS
> kernel #I9F351:修复CVE-2024-26598修复补丁修改错误<
https://gitee.com/open_euler/dashboard?issue_id=I9F351
> kernel #I9FGRE:arm64架构支持ebpf trampoline特性<
https://gitee.com/open_euler/dashboard?issue_id=I9FGRE
> kernel #I9GXII:Backport 5.10.203 LTS patches from upstream<
https://gitee.com/open_euler/dashboard?issue_id=I9GXII
> kernel openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-22.03-LTS-SP3 I96ID7 [22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp 主要 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.19日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG issue码云链接 CVE-2023-41419 I84A04 5.55 9.8 python-gevent Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2023-4584 I7WZ0C 1.14 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I7WZ0C
CVE-2023-51698 I9F7X1 4.31 8.8 evince GNOME
https://gitee.com/src-openeuler/evince/issues/I9F7X1
CVE-2023-32215 I71R4G 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I71R4G
CVE-2023-32213 I71R3Y 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I71R3Y
CVE-2023-32207 I71R3W 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I71R3W
CVE-2023-29536 I6UVEI 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I6UVEI
CVE-2023-29541 I6UVDN 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I6UVDN
CVE-2023-29539 I6UVDJ 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I6UVDJ
CVE-2023-29550 I6UVCU 6.64 8.8 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I6UVCU
CVE-2024-3446 I9FBRQ 5.31 8.2 qemu Virt
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
CVE-2024-31083 I9E4N6 0.31 7.8 xorg-x11-server-xwayland Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N6
CVE-2024-26256 I9FBQR 5.31 7.8 libarchive Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FBQR
CVE-2022-40529 I9GAMR 8.31 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GAMR
CVE-2023-33053 I9GAM0 8.31 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GAM0
CVE-2023-52441 I92OOJ 13.31 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I92OOJ
CVE-2023-1999 I6VVSM 0.64 7.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I6VVSM
CVE-2024-31309 I9E2OB 2.56 7.5 trafficserver Networking
https://gitee.com/src-openeuler/trafficserver/issues/I9E2OB
CVE-2022-34169 I9F7Q2 4.31 7.5 icedtea-web Compiler
https://gitee.com/src-openeuler/icedtea-web/issues/I9F7Q2
CVE-2024-20932 I9F7I0 4.31 7.5 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
CVE-2024-24786 I9B1P2 4.9 7.5 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1P2
CVE-2022-25731 I9GAL7 8.31 7.5 python-dns Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAL7
CVE-2022-25732 I9GAJX 8.31 7.5 python-dns Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAJX
CVE-2022-25728 I9GAJU 8.31 7.5 python-dns Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAJU
CVE-2024-1135 I9H10B 11.31 7.5 python-gunicorn sig-python-modules
https://gitee.com/src-openeuler/python-gunicorn/issues/I9H10B
CVE-2023-44488 I9HY69 13.58 7.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I9HY69
CVE-2024-20380 I9HX1I 13.65 7.5 clamav Others
https://gitee.com/src-openeuler/clamav/issues/I9HX1I
CVE-2024-20918 I9F7K6 4.31 7.4 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
CVE-2024-20952 I9F7GS 4.31 7.4 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7GS
CVE-2024-20697 I9FZ8M 7.31 7.3 libarchive Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FZ8M
CVE-2021-47084 I95REJ 5.65 6.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REJ
CVE-2022-2447 I9AQ5D 2.31 6.6 openstack-keystone sig-openstack
https://gitee.com/src-openeuler/openstack-keystone/issues/I9AQ5D
CVE-2023-4575 I7WYY3 1.14 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I7WYY3
CVE-2024-0753 I8YE1P 1.31 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8YE1P
CVE-2024-0747 I8YDZC 1.31 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8YDZC
CVE-2024-0741 I8YDYI 1.31 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8YDYI
CVE-2023-6865 I8PT2R 1.31 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2R
CVE-2023-6860 I8PT2K 1.31 6.5 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2K
CVE-2022-2553 I9AO7E 2.31 6.5 booth sig-Ha
https://gitee.com/src-openeuler/booth/issues/I9AO7E
CVE-2022-47950 I9B1HJ 4.31 6.5 python-swiftclient sig-openstack
https://gitee.com/src-openeuler/python-swiftclient/issues/I9B1HJ
CVE-2023-28100 I9AVQ9 10.14 6.5 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-6867 I8PT2L 1.31 6.1 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2L
CVE-2023-52323 I9AZF2 3.31 5.9 fence-agents sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9AZF2
CVE-2023-48795 I9AYAQ 3.31 5.9 libssh2 Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-29018 I9AWX6 3.31 5.9 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AWX6
CVE-2024-29018 I9AWWE 3.31 5.9 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AWWE
CVE-2024-29018 I9AWLZ 3.31 5.9 cri-tools sig-CloudNative
https://gitee.com/src-openeuler/cri-tools/issues/I9AWLZ
CVE-2024-27188 I9C1XR 7.31 5.9 plasma-breeze sig-KDE
https://gitee.com/src-openeuler/plasma-breeze/issues/I9C1XR
CVE-2024-28867 I9CTY2 9.31 5.9 prometheus sig-CloudNative
https://gitee.com/src-openeuler/prometheus/issues/I9CTY2
CVE-2023-48795 I9AYAU 11.14 5.9 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2022-47951 I9AVCJ 2.31 5.7 openstack-glance sig-openstack
https://gitee.com/src-openeuler/openstack-glance/issues/I9AVCJ
CVE-2022-47951 I9AVCG 2.31 5.7 openstack-nova sig-openstack
https://gitee.com/src-openeuler/openstack-nova/issues/I9AVCG
CVE-2022-2806 I9AR03 2.31 5.5 sos Base-service
https://gitee.com/src-openeuler/sos/issues/I9AR03
CVE-2022-1962 I9AN6B 2.31 5.5 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AN6B
CVE-2022-1962 I9AN5R 2.31 5.5 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AN5R
CVE-2022-1962 I9B0A3 3.31 5.5 libslirp CloudNative
https://gitee.com/src-openeuler/libslirp/issues/I9B0A3
CVE-2022-1962 I9B08Y 3.31 5.5 fuse-overlayfs CloudNative
https://gitee.com/src-openeuler/fuse-overlayfs/issues/I9B08Y
CVE-2022-1962 I9B08S 3.31 5.5 slirp4netns CloudNative
https://gitee.com/src-openeuler/slirp4netns/issues/I9B08S
CVE-2022-1962 I9B08R 3.31 5.5 containers-common sig-CloudNative
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
CVE-2022-1962 I9AXMR 3.31 5.5 crun sig-CloudNative
https://gitee.com/src-openeuler/crun/issues/I9AXMR
CVE-2022-1962 I9AXMJ 3.31 5.5 container-selinux sig-CloudNative
https://gitee.com/src-openeuler/container-selinux/issues/I9AXMJ
CVE-2022-1962 I9B1QW 4.31 5.5 etcd sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1QW
CVE-2023-52607 I96GP1 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GP1
CVE-2022-48629 I963KI 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I963KI
CVE-2021-47103 I95REP 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REP
CVE-2021-47090 I95REF 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REF
CVE-2023-52524 I95B1R 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1R
CVE-2023-52501 I95B10 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B10
CVE-2023-52532 I95AXS 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXS
CVE-2023-52521 I95AWP 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWP
CVE-2023-52513 I95AWN 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWN
CVE-2023-52574 I95ATZ 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
CVE-2023-52581 I95ATS 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATS
CVE-2023-52575 I95AT9 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT9
CVE-2023-52504 I95AT0 5.65 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT0
CVE-2023-6857 I8PT2D 1.31 5.3 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2D
CVE-2022-4122 I9ATC3 2.31 5.3 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATC3
CVE-2023-43490 I9AJ89 2.31 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ89
CVE-2023-39326 I9AY6T 3.31 5.3 promu sig-CloudNative
https://gitee.com/src-openeuler/promu/issues/I9AY6T
CVE-2023-3817 I9AWVX 3.31 5.3 edk2 Virt
https://gitee.com/src-openeuler/edk2/issues/I9AWVX
CVE-2023-39326 I9B1Q3 4.31 5.3 toolbox CloudNative
https://gitee.com/src-openeuler/toolbox/issues/I9B1Q3
CVE-2023-22081 I88VNW 8.14 5.3 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2024-20978 I9B0DW 3.31 4.9 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0DW
CVE-2024-20976 I9B0CE 3.31 4.9 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0CE
CVE-2022-0207 I9AL0Y 2.31 4.7 vdsm oVirt
https://gitee.com/src-openeuler/vdsm/issues/I9AL0Y
CVE-2023-52503 I95B3Q 5.65 4.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
CVE-2022-21595 I9AT7H 2.31 4.4 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9AT7H
CVE-2021-47082 I95REN 5.65 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REN
CVE-2021-47100 I95RE3 5.65 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE3
CVE-2022-48627 I95ATI 5.65 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATI
CVE-2024-28835 I9AFM6 1.31 4.3 gnutls sig-security-facility
https://gitee.com/src-openeuler/gnutls/issues/I9AFM6
CVE-2024-0749 I8YE00 1.31 4.3 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8YE00
CVE-2024-0742 I8YDXO 1.31 4.3 firefox Application
https://gitee.com/src-openeuler/firefox/issues/I8YDXO
CVE-2024-28180 I9C55E 7.31 4.3 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
CVE-2023-28101 I9AVQ7 10.14 4.3 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-45803 I9C54B 7.31 4.2 python-s3transfer sig-python-modules
https://gitee.com/src-openeuler/python-s3transfer/issues/I9C54B
CVE-2023-45803 I9C543 7.31 4.2 fence-agents sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9C543
CVE-2023-52592 I96GPQ 6.65 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPQ
CVE-2021-47085 I95RET 6.65 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RET
CVE-2023-52608 I98BNA 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BNA
CVE-2024-26629 I98BN3 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BN3
CVE-2024-2193 I98BBP 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BBP
CVE-2023-52498 I97NIA 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NIA
CVE-2024-26610 I97NI6 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI6
CVE-2023-52486 I97NI1 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI1
CVE-2023-52490 I97NI0 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI0
CVE-2024-26614 I97NHZ 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHZ
CVE-2023-52492 I97NHW 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHW
CVE-2024-26611 I97NHV 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHV
CVE-2024-26613 I97NHU 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHU
CVE-2024-26608 I97NHT 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHT
CVE-2024-26615 I97NHS 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHS
CVE-2023-52495 I97NHQ 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHQ
CVE-2023-52487 I97NHO 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHO
CVE-2024-26619 I97NHN 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHN
CVE-2024-26609 I97NHM 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHM
CVE-2024-26617 I97NHJ 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHJ
CVE-2023-52494 I97NHG 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHG
CVE-2024-26616 I97NHF 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHF
CVE-2024-26612 I97NHE 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHE
CVE-2023-52491 I97NHC 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHC
CVE-2023-52493 I97NHA 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHA
CVE-2024-26618 I97NH8 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NH8
CVE-2024-26620 I97NH7 11.6 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NH7
CVE-2024-21472 I9DFHM 12.31 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DFHM
CVE-2023-22025 I88JFX 8.14 3.7 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2022-4123 I9ATB7 2.31 3.3 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATB7
CVE-2023-52567 I95ATO 5.65 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATO
CVE-2021-47059 I94VOI 5.65 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOI
CVE-2024-24786 I9B1O7 3.5 0.0 ignition K8sDistro
https://gitee.com/src-openeuler/ignition/issues/I9B1O7
CVE-2024-24784 I9B1O5 3.5 0.0 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9B1O5
CVE-2024-24784 I9B1O4 3.5 0.0 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1O4
CVE-2024-24784 I9B1NZ 3.5 0.0 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9B1NZ
CVE-2024-24786 I9B1PV 3.51 0.0 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9B1PV
CVE-2024-24786 I9B1P1 3.51 0.0 etcd sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1P1
CVE-2024-24786 I9B1P0 3.51 0.0 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9B1P0
CVE-2024-30161 I9B1Y5 3.58 0.0 qt Runtime
https://gitee.com/src-openeuler/qt/issues/I9B1Y5
CVE-2024-25580 I9BYTK 6.65 0.0 qt Runtime
https://gitee.com/src-openeuler/qt/issues/I9BYTK
CVE-2023-45935 I9BZX0 6.74 0.0 qt Runtime
https://gitee.com/src-openeuler/qt/issues/I9BZX0
社区关键组件待修复缺陷: openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。 社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑): 序号 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 I4V9K0 gcc 10.3.0 __libc_vfork符号丢失(i686架构) 任务 2022/2/25 14:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2 I4YT2R iscsi登录操作并发sysfs读操作概率导致空指针访问 任务 2022/3/21 15:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3 I58CJR 删除iptable_filter.ko时出现空指针问题 任务 2022/5/19 20:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4 I5C33B OLK-5.10 page owner功能增强 任务 2022/6/13 20:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5 I5D9J8 Upgrade to latest release [kernel: 5.10.0 -> 5.17] 任务 2022/6/21 10:01 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6 I5G321 【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic 任务 2022/7/8 9:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7 I5H311 修复CVE-2022-2380 任务 2022/7/14 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8 I5I2M8 x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware. 任务 2022/7/21 9:47 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9 I5OOLB 反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397 任务 2022/8/29 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10 I5PBRB 注入内存申请故障,i40iw_initialize_dev失败时出现oops复位 任务 2022/9/2 9:56 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11 I5RH8C 内存可靠性分级需求 任务 2022/9/16 16:16 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12 I5V92B openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划 任务 2022/10/12 11:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13 I5VCIJ openEuler如何适配新硬件,请提供适配流程指导 任务 2022/10/12 17:14 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14 I5WCP1 回合bpftool prog attach/detach命令 任务 2022/10/18 16:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15 I67IFE 建议sssd拆分出对应功能的子包 任务 2022/12/26 16:49 无优先级 src-openEuler/sssd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I67IFE
16 I6FZWY 主线回合scsi: iscsi_tcp: Fix UAF during logout and login 任务 2023/2/18 11:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
17 I6HXB9 kernel.spec中是否会新增打包intel-sst工具 任务 2023/2/27 10:06 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
18 I6MJB4 openssl 3.0 支持TLCP特性 任务 2023/3/13 11:35 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
19 I6N49D 【openeuler-22.03-LTS-SP】 任务 2023/3/14 20:12 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
20 I6PA84 神威架构,虚拟化启动失败 任务 2023/3/22 17:20 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
21 I6TQ8W curl命令向hadoop3.2.1 webhdfs put文件失败 任务 2023/4/7 18:02 严重 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
22 I6UDV8 Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp 任务 2023/4/10 16:14 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
23 I6VWNS 主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析 任务 2023/4/15 10:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
24 I70VML 指针压缩选项的错误提示内容有误。 缺陷 2023/5/6 16:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
25 I71KX8 python3.spec文件中,无效的ifarch语句 任务 2023/5/9 15:00 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
26 I7A5FW Fixed CPU topology issues and add lbt support for kvm. 任务 2023/6/1 17:18 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
27 I7B6KR kerberos安装缺少krb5-auth-dialog 和 krb5-workstation 任务 2023/6/6 9:51 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
28 I7CKVY peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错 缺陷 2023/6/11 22:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
29 I7CWOS Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level 任务 2023/6/12 20:51 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
30 I7EZAZ 无法在sw_64下编译nodejs 任务 2023/6/20 16:50 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
31 I7L968 Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09] 任务 2023/7/14 17:09 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
32 I7LSWG Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03] 任务 2023/7/17 20:50 无优先级 src-openEuler/gtk2 Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
33 I8790J need EPYC-Genoa model support 任务 2023/10/11 16:53 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
34 I8A77R Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01] 任务 2023/10/23 16:22 无优先级 src-openEuler/alsa-lib Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
35 I8KAVR dnf reinstall kernel 导致grub.conf 本内核项被删除 任务 2023/11/29 10:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
36 I8ON5A Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13] 任务 2023/12/15 11:04 无优先级 src-openEuler/cronie Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
37 I8ON6X Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21] 任务 2023/12/15 11:06 无优先级 src-openEuler/dbus Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
38 I8OOF1 Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14] 任务 2023/12/15 12:29 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
39 I8OOF5 Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11] 任务 2023/12/15 12:31 无优先级 src-openEuler/libarchive Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
40 I8PL8Q Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17] 任务 2023/12/19 11:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
41 I8SZWW qemu 4.1 虚拟机热迁移到qemu 6.2失败 任务 2024/1/2 17:01 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
42 I8UCFC 鲲鹏920服务器多次重启后系统盘盘符跳变 任务 2024/1/8 11:18 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
43 I8VIRN Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31] 任务 2024/1/12 9:17 无优先级 src-openEuler/libcap sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
44 I8VIRQ Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13] 任务 2024/1/12 9:17 无优先级 src-openEuler/libselinux sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
45 I8XTDI rpm宏用$引用可能会出现空值 缺陷 2024/1/21 22:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
46 I8ZJG1 欧拉系统virt-install 创建虚拟机video类型默认使用qxl 任务 2024/1/29 10:44 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
47 I930G8 【24.03 LTS】软件包选型 任务 2024/2/22 19:34 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I930G8
48 I931BJ 【24.03 LTS】软件包选型 任务 2024/2/22 20:36 无优先级 src-openEuler/sqlite DB
https://gitee.com/open_euler/dashboard?issue_id=I931BJ
49 I93C47 【24.03 LTS】软件包选型 任务 2024/2/23 17:46 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I93C47
50 I95DT3 openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布? 任务 2024/3/4 0:39 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
51 I96B4W systemd中缺少文件 任务 2024/3/6 14:53 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
52 I96BZU 逻辑卷组修复 任务 2024/3/6 15:36 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
53 I97V59 preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机 缺陷 2024/3/12 16:09 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
54 I9BNUP 使用clang时缺少gnu/stubs-32.h文件 任务 2024/3/26 13:43 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
55 I9C507 gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化 缺陷 2024/3/27 18:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
56 I9COZE 【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式 缺陷 2024/3/29 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
57 I9CQSL openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡 缺陷 2024/3/29 16:57 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
58 I9CXWG 当mount挂载点多的时候,systemd-hostnamd服务启动时间太长 任务 2024/3/30 18:58 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9CXWG
59 I9DV2U spec文件不同架构分支存在相同构建方式 任务 2024/4/3 11:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
60 I9EHLX openEuler22.03 sp1设置成gb18030编码以后,timedatectl 报Eaile to print table:Invalid argument 任务 2024/4/7 14:55 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EHLX
61 I9EU9I openEuler 24.03 RISC-V中,切换至新建的用户的umask权限没有改变 缺陷 2024/4/8 15:14 无优先级 src-openEuler/bash Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EU9I
62 I9FI38 【obs】glib2在openEuler:22.03:LTS构建失败 缺陷 2024/4/10 15:34 无优先级 src-openEuler/glib2 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9FI38
63 I9FU1M [openEuler-22.03-LTS] libvirt install failed 任务 2024/4/11 15:44 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
64 I9FVI3 22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步 任务 2024/4/11 16:57 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
65 I9G205 【误解提示】救援模式下,提示用户输入root密码 缺陷 2024/4/12 11:06 无优先级 src-openEuler/util-linux Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9G205
66 I9G2PH 测试!!!软件市场精品应用curl-null镜像自动更新,8.4.0->8.4.1 任务 2024/4/12 11:45 无优先级 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I9G2PH
67 I9GR88 回合上游社区补丁,补丁数量:3 缺陷 2024/4/15 15:50 无优先级 src-openEuler/iputils Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GR88
68 I9GR89 回合上游社区补丁,补丁数量:3 缺陷 2024/4/15 15:50 无优先级 src-openEuler/iproute Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GR89
69 I9GUR2 libnl3合入开源补丁 缺陷 2024/4/15 19:20 无优先级 src-openEuler/libnl3 Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUR2
70 I9GURR NetworkManager社区补丁分析回合 缺陷 2024/4/15 19:21 无优先级 src-openEuler/NetworkManager Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURR
71 I9GURW iproute社区补丁分析回合 缺陷 2024/4/15 19:21 无优先级 src-openEuler/iproute Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURW
72 I9GURZ libnl3社区补丁分析回合 缺陷 2024/4/15 19:21 无优先级 src-openEuler/libnl3 Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURZ
73 I9GUS0 iputils社区补丁分析回合 缺陷 2024/4/15 19:21 无优先级 src-openEuler/iputils Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUS0
74 I9GUS1 glibc社区补丁分析回合 缺陷 2024/4/15 19:21 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9GUS1
75 I9GUS2 libnl3自研用例存在内存泄漏 缺陷 2024/4/15 19:21 无优先级 src-openEuler/libnl3 Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUS2
76 I9GV9V qemu-8.2.0-6.oe2403.x86_64.src.rpm 在编译的check阶段执行tests/qtest/bios-tables-test是测试失败 缺陷 2024/4/15 20:30 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9GV9V
77 I9H2MR 【误解提示】救援模式下,提示用户输入root密码 缺陷 2024/4/16 14:39 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H2MR
78 I9H3O6 【kernel-rt】x86的rt版本,启动后看不到内核日志 缺陷 2024/4/16 15:04 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H3O6
79 I9H736 Upgrade to latest release [libiscsi: 1.19.0 -> 1.20.0] 任务 2024/4/16 17:40 无优先级 src-openEuler/libiscsi Storage
https://gitee.com/open_euler/dashboard?issue_id=I9H736
80 I9HBPH mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist 缺陷 2024/4/17 10:23 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I9HBPH
81 I9HH3W ip vrf exec vrf1执行报错setexecfilecon for "xxx" failed 缺陷 2024/4/17 16:10 无优先级 src-openEuler/iproute Networking
https://gitee.com/open_euler/dashboard?issue_id=I9HH3W
82 I9HI69 ssh软链接后门 缺陷 2024/4/17 17:13 无优先级 src-openEuler/openssh Networking
https://gitee.com/open_euler/dashboard?issue_id=I9HI69
83 I9HICZ 安装gcc_secure后,rpmbuild -ba coreutils.spec失败 缺陷 2024/4/17 17:25 无优先级 src-openEuler/coreutils Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9HICZ
84 I9HSY5 操作系统支持GM/T 0003测试SM2私钥签名报错 缺陷 2024/4/18 16:21 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I9HSY5
openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
>
1
0
0
0
[Release] openEuler update_20240410版本发布公告
by update版本发布邮箱
12 Apr '24
12 Apr '24
主题: openEuler update_20240410版本发布公告 Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。 本公示分为九部分: 1、openEuler-20.03-LTS-SP1 Update 20240410发布情况及待修复缺陷 2、openEuler-22.03-LTS Update 20240410发布情况及待修复缺陷 3、openEuler-22.03-LTS-SP1 Update 20240410发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP2 Update 20240410发布情况及待修复缺陷 5、openEuler-20.03-LTS-SP4 Update 20240410发布情况及待修复缺陷 6、openEuler-22.03-LTS-SP3 Update 20240410发布情况及待修复缺陷 7、openEuler 关键组件待修复CVE 清单 8、openEuler 关键组件待修复缺陷清单 9、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2024/04/19)提供 update_20240417 版本。 openEuler-20.03-LTS-SP1 Update 20240410 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题13个,已知漏洞106个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1X?from=project-i…
CVE修复: CVE 仓库 score #I58YVD:CVE-2022-1802<
https://gitee.com/open_euler/dashboard?issue_id=I58YVD
> firefox 8.8 #I9AO3J:CVE-2022-31163<
https://gitee.com/open_euler/dashboard?issue_id=I9AO3J
> rubygem-tzinfo 8.1 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I9AVQD:CVE-2021-32142<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQD
> LibRaw 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I8YV0T:CVE-2024-23307<
https://gitee.com/open_euler/dashboard?issue_id=I8YV0T
> kernel 7.8 #I95LPF:CVE-2024-26622<
https://gitee.com/open_euler/dashboard?issue_id=I95LPF
> kernel 7.8 #I96G7N:CVE-2023-52600<
https://gitee.com/open_euler/dashboard?issue_id=I96G7N
> kernel 7.8 #I96GXM:CVE-2024-26625<
https://gitee.com/open_euler/dashboard?issue_id=I96GXM
> kernel 7.8 #I990AF:CVE-2021-47131<
https://gitee.com/open_euler/dashboard?issue_id=I990AF
> kernel 7.8 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9AUYL:CVE-2022-24999<
https://gitee.com/open_euler/dashboard?issue_id=I9AUYL
> nodejs-qs 7.5 #I9AVYL:CVE-2022-48279<
https://gitee.com/open_euler/dashboard?issue_id=I9AVYL
> mod_security 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9AWCO:CVE-2022-39028<
https://gitee.com/open_euler/dashboard?issue_id=I9AWCO
> telnet 7.5 #I9ASUL:CVE-2022-2309<
https://gitee.com/open_euler/dashboard?issue_id=I9ASUL
> libxml2 7.5 #I9ACE0:CVE-2024-2002<
https://gitee.com/open_euler/dashboard?issue_id=I9ACE0
> libdwarf 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I9DS2T:CVE-2024-3205<
https://gitee.com/open_euler/dashboard?issue_id=I9DS2T
> libyaml 7.3 #I99JOA:CVE-2024-1013<
https://gitee.com/open_euler/dashboard?issue_id=I99JOA
> unixODBC 7.1 #I949C5:CVE-2021-46952<
https://gitee.com/open_euler/dashboard?issue_id=I949C5
> kernel 7.1 #I96G7F:CVE-2023-52599<
https://gitee.com/open_euler/dashboard?issue_id=I96G7F
> kernel 7.1 #I96G8Y:CVE-2023-52602<
https://gitee.com/open_euler/dashboard?issue_id=I96G8Y
> kernel 7.1 #I96G93:CVE-2023-52603<
https://gitee.com/open_euler/dashboard?issue_id=I96G93
> kernel 7.1 #I96GQ3:CVE-2023-52601<
https://gitee.com/open_euler/dashboard?issue_id=I96GQ3
> kernel 7.1 #I95AXP:CVE-2023-52502<
https://gitee.com/open_euler/dashboard?issue_id=I95AXP
> kernel 7 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I9AW6M:CVE-2023-0666<
https://gitee.com/open_euler/dashboard?issue_id=I9AW6M
> wireshark 6.5 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I99JV2:CVE-2024-26641<
https://gitee.com/open_euler/dashboard?issue_id=I99JV2
> kernel 6.1 #I95RDW:CVE-2021-47101<
https://gitee.com/open_euler/dashboard?issue_id=I95RDW
> kernel 6 #I96G8W:CVE-2023-52587<
https://gitee.com/open_euler/dashboard?issue_id=I96G8W
> kernel 6 #I9A82U:CVE-2024-29018<
https://gitee.com/open_euler/dashboard?issue_id=I9A82U
> docker 5.9 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I8OJ8L:CVE-2023-37328<
https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L
> gstreamer1-plugins-base 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-26600<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I93LMH:CVE-2021-46904<
https://gitee.com/open_euler/dashboard?issue_id=I93LMH
> kernel 5.5 #I94JCO:CVE-2021-46989<
https://gitee.com/open_euler/dashboard?issue_id=I94JCO
> kernel 5.5 #I94JH2:CVE-2020-36780<
https://gitee.com/open_euler/dashboard?issue_id=I94JH2
> kernel 5.5 #I95B1F:CVE-2023-52509<
https://gitee.com/open_euler/dashboard?issue_id=I95B1F
> kernel 5.5 #I9909R:CVE-2021-47113<
https://gitee.com/open_euler/dashboard?issue_id=I9909R
> kernel 5.5 #I9909V:CVE-2021-47114<
https://gitee.com/open_euler/dashboard?issue_id=I9909V
> kernel 5.5 #I990A7:CVE-2021-47122<
https://gitee.com/open_euler/dashboard?issue_id=I990A7
> kernel 5.5 #I95REH:CVE-2021-47091<
https://gitee.com/open_euler/dashboard?issue_id=I95REH
> kernel 5.5 #I99K08:CVE-2024-26633<
https://gitee.com/open_euler/dashboard?issue_id=I99K08
> kernel 5.5 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9BJ5X:CVE-2024-30205<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X
> emacs 5 #I917LZ:CVE-2024-24855<
https://gitee.com/open_euler/dashboard?issue_id=I917LZ
> kernel 4.7 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I947PH:CVE-2021-46928<
https://gitee.com/open_euler/dashboard?issue_id=I947PH
> kernel 4.4 #I947U7:CVE-2021-46935<
https://gitee.com/open_euler/dashboard?issue_id=I947U7
> kernel 4.4 #I947OW:CVE-2021-46924<
https://gitee.com/open_euler/dashboard?issue_id=I947OW
> kernel 4.3 #I95RE9:CVE-2021-47086<
https://gitee.com/open_euler/dashboard?issue_id=I95RE9
> kernel 4 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I947SE:CVE-2021-46934<
https://gitee.com/open_euler/dashboard?issue_id=I947SE
> kernel 3.3 #I949D9:CVE-2020-36777<
https://gitee.com/open_euler/dashboard?issue_id=I949D9
> kernel 3.3 #I94JHY:CVE-2020-36784<
https://gitee.com/open_euler/dashboard?issue_id=I94JHY
> kernel 3.3 #I990AA:CVE-2021-47112<
https://gitee.com/open_euler/dashboard?issue_id=I990AA
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I9A7Y2:CVE-2023-50967<
https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2
> jose 2.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 #I9BGUB:CVE-2021-47142<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUB
> kernel 1 #I9BGMR:CVE-2021-47143<
https://gitee.com/open_euler/dashboard?issue_id=I9BGMR
> kernel 1 #I9BGUR:CVE-2021-47144<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUR
> kernel 1 #I9BGQL:CVE-2021-47145<
https://gitee.com/open_euler/dashboard?issue_id=I9BGQL
> kernel 1 #I9BGV4:CVE-2021-47146<
https://gitee.com/open_euler/dashboard?issue_id=I9BGV4
> kernel 1 #I9BGKK:CVE-2021-47149<
https://gitee.com/open_euler/dashboard?issue_id=I9BGKK
> kernel 1 #I9BGVY:CVE-2021-47150<
https://gitee.com/open_euler/dashboard?issue_id=I9BGVY
> kernel 1 #I9BGWP:CVE-2021-47153<
https://gitee.com/open_euler/dashboard?issue_id=I9BGWP
> kernel 1 #I9BHSG:CVE-2021-47159<
https://gitee.com/open_euler/dashboard?issue_id=I9BHSG
> kernel 1 #I9BHG2:CVE-2021-47160<
https://gitee.com/open_euler/dashboard?issue_id=I9BHG2
> kernel 1 #I9BHF9:CVE-2021-47162<
https://gitee.com/open_euler/dashboard?issue_id=I9BHF9
> kernel 1 #I9BHRY:CVE-2021-47163<
https://gitee.com/open_euler/dashboard?issue_id=I9BHRY
> kernel 1 #I9BHTI:CVE-2021-47167<
https://gitee.com/open_euler/dashboard?issue_id=I9BHTI
> kernel 1 #I9BHLP:CVE-2021-47169<
https://gitee.com/open_euler/dashboard?issue_id=I9BHLP
> kernel 1 #I9BHQL:CVE-2021-47170<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQL
> kernel 1 #I9BHNM:CVE-2021-47171<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNM
> kernel 1 #I9BHNX:CVE-2021-47173<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNX
> kernel 1 #I9BHQ7:CVE-2021-47180<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7
> kernel 1 #I9AK6C:CVE-2023-52620<
https://gitee.com/open_euler/dashboard?issue_id=I9AK6C
> kernel 1 #I9BV4P:CVE-2023-52622<
https://gitee.com/open_euler/dashboard?issue_id=I9BV4P
> kernel 1 #I9CTGE:CVE-2023-52629<
https://gitee.com/open_euler/dashboard?issue_id=I9CTGE
> kernel 1 #I9AK56:CVE-2024-26642<
https://gitee.com/open_euler/dashboard?issue_id=I9AK56
> kernel 1 #I9BV23:CVE-2024-26644<
https://gitee.com/open_euler/dashboard?issue_id=I9BV23
> kernel 1 #I9BV24:CVE-2024-26645<
https://gitee.com/open_euler/dashboard?issue_id=I9BV24
> kernel 1 #I9C6FA:CVE-2024-26651<
https://gitee.com/open_euler/dashboard?issue_id=I9C6FA
> kernel 1 #I9DD86:CVE-2024-26654<
https://gitee.com/open_euler/dashboard?issue_id=I9DD86
> kernel 1 #I9DNPD:CVE-2024-26668<
https://gitee.com/open_euler/dashboard?issue_id=I9DNPD
> kernel 1 #I9E2O0:CVE-2024-26751<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O0
> kernel 1 #I9C6WS:CVE-2024-28085<
https://gitee.com/open_euler/dashboard?issue_id=I9C6WS
> util-linux 0 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<
https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH
> kernel #I9355O:keys: safe concurrent user->{session,uid}_keyring access<
https://gitee.com/open_euler/dashboard?issue_id=I9355O
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/open_euler/dashboard?issue_id=I97HJA
> kernel #I991GQ:crypto: algif_aead - fix uninitialized ctx->init<
https://gitee.com/open_euler/dashboard?issue_id=I991GQ
> kernel #I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<
https://gitee.com/open_euler/dashboard?issue_id=I992IL
> kernel #I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<
https://gitee.com/open_euler/dashboard?issue_id=I9ARW6
> kernel #I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<
https://gitee.com/open_euler/dashboard?issue_id=I9AZFU
> kernel #I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<
https://gitee.com/open_euler/dashboard?issue_id=I9BD67
> kernel #I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<
https://gitee.com/open_euler/dashboard?issue_id=I9BWES
> kernel #I9C0QZ:mlock 溢出没有返回失败<
https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ
> kernel #I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<
https://gitee.com/open_euler/dashboard?issue_id=I9D6UN
> kernel #I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<
https://gitee.com/open_euler/dashboard?issue_id=I9DOVK
> kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 20.03LTS SP1 update2103 I3E5C1 【20.03-SP1】【arm/x86】服务启动失败 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1 I3QGU7 系统不支持GB18030 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926 I4CMSV 【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd 无优先级 sig/TC openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild I5Y99T mate-desktop install problem in openEuler:20:03:LTS:SP1 无优先级 sig/sig-mate-desktop src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240410 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞54个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Z?from=project-i…
CVE修复: CVE 仓库 score #I9C6X1:CVE-2024-3019<
https://gitee.com/open_euler/dashboard?issue_id=I9C6X1
> pcp 8.8 #I92HWD:CVE-2024-24474<
https://gitee.com/open_euler/dashboard?issue_id=I92HWD
> qemu 8.2 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I9AVQD:CVE-2021-32142<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQD
> LibRaw 7.8 #I932VH:CVE-2024-26589<
https://gitee.com/open_euler/dashboard?issue_id=I932VH
> kernel 7.8 #I9AWCO:CVE-2022-39028<
https://gitee.com/open_euler/dashboard?issue_id=I9AWCO
> telnet 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9AUYL:CVE-2022-24999<
https://gitee.com/open_euler/dashboard?issue_id=I9AUYL
> nodejs-qs 7.5 #I9AVYL:CVE-2022-48279<
https://gitee.com/open_euler/dashboard?issue_id=I9AVYL
> mod_security 7.5 #I9ACE0:CVE-2024-2002<
https://gitee.com/open_euler/dashboard?issue_id=I9ACE0
> libdwarf 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I99JOA:CVE-2024-1013<
https://gitee.com/open_euler/dashboard?issue_id=I99JOA
> unixODBC 7.1 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I9AVQ9:CVE-2023-28100<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9
> flatpak 6.5 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9AW6M:CVE-2023-0666<
https://gitee.com/open_euler/dashboard?issue_id=I9AW6M
> wireshark 6.5 #I93ED1:CVE-2023-52454<
https://gitee.com/open_euler/dashboard?issue_id=I93ED1
> kernel 6.5 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I8OJ8L:CVE-2023-37328<
https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L
> gstreamer1-plugins-base 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-2660<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I97N53:CVE-2024-1441<
https://gitee.com/open_euler/dashboard?issue_id=I97N53
> libvirt 5.5 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I93X74:CVE-2024-26144<
https://gitee.com/open_euler/dashboard?issue_id=I93X74
> rubygem-activestorage 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9BJ5X:CVE-2024-30205<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X
> emacs 5 #I92REM:CVE-2024-26585<
https://gitee.com/open_euler/dashboard?issue_id=I92REM
> kernel 4.7 #I93ELY:CVE-2024-26593<
https://gitee.com/open_euler/dashboard?issue_id=I93ELY
> kernel 4.7 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93L7E:CVE-2023-52467<
https://gitee.com/open_euler/dashboard?issue_id=I93L7E
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I94K5J:CVE-2021-47037<
https://gitee.com/open_euler/dashboard?issue_id=I94K5J
> kernel 4.4 #I9AVQ7:CVE-2023-28101<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7
> flatpak 4.3 #I93EEE:CVE-2023-52456<
https://gitee.com/open_euler/dashboard?issue_id=I93EEE
> kernel 4 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I9A7Y2:CVE-2023-50967<
https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2
> jose 2.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I9EWHR:tbl访问未初始化的内存<
https://gitee.com/src-openeuler/groff/issues/I9EWHR
> groff #I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<
https://gitee.com/openeuler/kernel/issues/I90ZB5
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/openeuler/kernel/issues/I97HJA
> kernel openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS update20230726 I7ORCE 【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS I72N5G 【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild I5RTUS X86架构下无法对mysql8进行autobolt模式反馈编译,报错 无优先级 sig/Compiler,kind/feature src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild I5XP8E Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild I65UF9 aarch64架构boost icl模板库优化错误 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240410 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞69个,热补丁1个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1W?from=project-i…
CVE修复: CVE 仓库 score #I9C6X1:CVE-2024-3019<
https://gitee.com/open_euler/dashboard?issue_id=I9C6X1
> pcp 8.8 #I92HWD:CVE-2024-24474<
https://gitee.com/open_euler/dashboard?issue_id=I92HWD
> qemu 8.2 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I9AVQD:CVE-2021-32142<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQD
> LibRaw 7.8 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I932VH:CVE-2024-26589<
https://gitee.com/open_euler/dashboard?issue_id=I932VH
> kernel 7.8 #I9AUYL:CVE-2022-24999<
https://gitee.com/open_euler/dashboard?issue_id=I9AUYL
> nodejs-qs 7.5 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I9AVYL:CVE-2022-48279<
https://gitee.com/open_euler/dashboard?issue_id=I9AVYL
> mod_security 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I9ACE0:CVE-2024-2002<
https://gitee.com/open_euler/dashboard?issue_id=I9ACE0
> libdwarf 7.5 #I8X4FY:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FY
> ignition 7.5 #I90BQQ:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BQQ
> cri-tools 7.5 #I8X4G2:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4G2
> cri-tools 7.5 #I9B1P4:CVE-2024-24786<
https://gitee.com/open_euler/dashboard?issue_id=I9B1P4
> cri-tools 7.5 #I90BSM:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BSM
> cri-o 7.5 #I8X4FZ:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ
> cri-o 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I99JOA:CVE-2024-1013<
https://gitee.com/open_euler/dashboard?issue_id=I99JOA
> unixODBC 7.1 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9AW6M:CVE-2023-0666<
https://gitee.com/open_euler/dashboard?issue_id=I9AW6M
> wireshark 6.5 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I9AVQ9:CVE-2023-28100<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9
> flatpak 6.5 #I93ED1:CVE-2023-52454<
https://gitee.com/open_euler/dashboard?issue_id=I93ED1
> kernel 6.5 #I94PA7:CVE-2023-52475<
https://gitee.com/open_euler/dashboard?issue_id=I94PA7
> kernel 6.3 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I675RB:CVE-2022-4318<
https://gitee.com/src-openeuler/cri-o/issues/I675RB
> cri-o 6.1 #I9AYAU:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAU
> cri-o 5.9 #I8OJ8L:CVE-2023-37328<
https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L
> gstreamer1-plugins-base 5.5 #I97N53:CVE-2024-1441<
https://gitee.com/open_euler/dashboard?issue_id=I97N53
> libvirt 5.5 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-2660<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I94OZS:CVE-2023-52484<
https://gitee.com/open_euler/dashboard?issue_id=I94OZS
> kernel 5.5 #I94P2I:CVE-2023-52479<
https://gitee.com/open_euler/dashboard?issue_id=I94P2I
> kernel 5.5 #I93HD8:CVE-2024-26603<
https://gitee.com/open_euler/dashboard?issue_id=I93HD8
> kernel 5.5 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I93X74:CVE-2024-26144<
https://gitee.com/open_euler/dashboard?issue_id=I93X74
> rubygem-activestorage 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9BJ5X:CVE-2024-30205<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X
> emacs 5 #I92REM:CVE-2024-26585<
https://gitee.com/open_euler/dashboard?issue_id=I92REM
> kernel 4.7 #I93ELY:CVE-2024-26593<
https://gitee.com/open_euler/dashboard?issue_id=I93ELY
> kernel 4.7 #I94P3R:CVE-2023-52476<
https://gitee.com/open_euler/dashboard?issue_id=I94P3R
> kernel 4.7 #I94UOT:CVE-2024-26607<
https://gitee.com/open_euler/dashboard?issue_id=I94UOT
> kernel 4.7 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93L7E:CVE-2023-52467<
https://gitee.com/open_euler/dashboard?issue_id=I93L7E
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I94K5J:CVE-2021-47037<
https://gitee.com/open_euler/dashboard?issue_id=I94K5J
> kernel 4.4 #I94P5J:CVE-2023-52477<
https://gitee.com/open_euler/dashboard?issue_id=I94P5J
> kernel 4.4 #I9AVQ7:CVE-2023-28101<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7
> flatpak 4.3 #I93EEE:CVE-2023-52456<
https://gitee.com/open_euler/dashboard?issue_id=I93EEE
> kernel 4 #I97NHT:CVE-2024-26608<
https://gitee.com/open_euler/dashboard?issue_id=I97NHT
> kernel 4 #I97NIJ:CVE-2024-2357<
https://gitee.com/open_euler/dashboard?issue_id=I97NIJ
> libreswan 3.5 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I9EWHR:tbl访问未初始化的内存<
https://gitee.com/src-openeuler/groff/issues/I9EWHR
> groff #I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<
https://gitee.com/openeuler/kernel/issues/I90ZB5
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/openeuler/kernel/issues/I97HJA
> kernel 热补丁: 仓库 CVE score kernel CVE-2024-0841 7.8 openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler 22.03-SP1 I6B4V1 【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常 主要 sig/bigdata src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726 I7OR2I 【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败 主要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1 I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 次要 sig/DB src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1 I73CKF 【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 次要 sig/Base-service src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1 I84L9F openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240410 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞75个,热补丁1个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1V?from=project-i…
CVE修复: CVE 仓库 score #I92HWD:CVE-2024-24474<
https://gitee.com/open_euler/dashboard?issue_id=I92HWD
> qemu 8.2 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I89S5X:CVE-2023-45675<
https://gitee.com/open_euler/dashboard?issue_id=I89S5X
> stb 7.8 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I9AVQD:CVE-2021-32142<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQD
> LibRaw 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I932VH:CVE-2024-26589<
https://gitee.com/open_euler/dashboard?issue_id=I932VH
> kernel 7.8 #I9AUYL:CVE-2022-24999<
https://gitee.com/open_euler/dashboard?issue_id=I9AUYL
> nodejs-qs 7.5 #I8X4FY:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FY
> ignition 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I9ACE0:CVE-2024-2002<
https://gitee.com/open_euler/dashboard?issue_id=I9ACE0
> libdwarf 7.5 #I90BQQ:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BQQ
> cri-tools 7.5 #I8X4G2:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4G2
> cri-tools 7.5 #I9B1P4:CVE-2024-24786<
https://gitee.com/open_euler/dashboard?issue_id=I9B1P4
> cri-tools 7.5 #I90BSM:CVE-2022-41723<
https://gitee.com/open_euler/dashboard?issue_id=I90BSM
> cri-o 7.5 #I8X4FZ:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ
> cri-o 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I9AWCO:CVE-2022-39028<
https://gitee.com/open_euler/dashboard?issue_id=I9AWCO
> telnet 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I99JOA:CVE-2024-1013<
https://gitee.com/open_euler/dashboard?issue_id=I99JOA
> unixODBC 7.1 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I9AW6M:CVE-2023-0666<
https://gitee.com/open_euler/dashboard?issue_id=I9AW6M
> wireshark 6.5 #I9AVQ9:CVE-2023-28100<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9
> flatpak 6.5 #I93ED1:CVE-2023-52454<
https://gitee.com/open_euler/dashboard?issue_id=I93ED1
> kernel 6.5 #I94PA7:CVE-2023-52475<
https://gitee.com/open_euler/dashboard?issue_id=I94PA7
> kernel 6.3 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I9AYAU:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAU
> cri-o 5.9 #I97N53:CVE-2024-1441<
https://gitee.com/open_euler/dashboard?issue_id=I97N53
> libvirt 5.5 #I8OJ8L:CVE-2023-37328<
https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L
> gstreamer1-plugins-base 5.5 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-26600<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I93HD8:CVE-2024-26603<
https://gitee.com/open_euler/dashboard?issue_id=I93HD8
> kernel 5.5 #I94OZS:CVE-2023-52484<
https://gitee.com/open_euler/dashboard?issue_id=I94OZS
> kernel 5.5 #I94P2I:CVE-2023-52479<
https://gitee.com/open_euler/dashboard?issue_id=I94P2I
> kernel 5.5 #I93X74:CVE-2024-26144<
https://gitee.com/open_euler/dashboard?issue_id=I93X74
> rubygem-activestorage 5.3 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9BJ5X:CVE-2024-30205<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X
> emacs 5 #I92REM:CVE-2024-26585<
https://gitee.com/open_euler/dashboard?issue_id=I92REM
> kernel 4.7 #I93ELY:CVE-2024-26593<
https://gitee.com/open_euler/dashboard?issue_id=I93ELY
> kernel 4.7 #I94P3R:CVE-2023-52476<
https://gitee.com/open_euler/dashboard?issue_id=I94P3R
> kernel 4.7 #I94UOT:CVE-2024-26607<
https://gitee.com/open_euler/dashboard?issue_id=I94UOT
> kernel 4.7 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93L7E:CVE-2023-52467<
https://gitee.com/open_euler/dashboard?issue_id=I93L7E
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I94K5J:CVE-2021-47037<
https://gitee.com/open_euler/dashboard?issue_id=I94K5J
> kernel 4.4 #I93ED4:CVE-2023-52462<
https://gitee.com/open_euler/dashboard?issue_id=I93ED4
> kernel 4.4 #I94P5J:CVE-2023-52477<
https://gitee.com/open_euler/dashboard?issue_id=I94P5J
> kernel 4.4 #I9AVQ7:CVE-2023-28101<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7
> flatpak 4.3 #I93EDC:CVE-2023-52457<
https://gitee.com/open_euler/dashboard?issue_id=I93EDC
> kernel 4.2 #I93EEE:CVE-2023-52456<
https://gitee.com/open_euler/dashboard?issue_id=I93EEE
> kernel 4 #I97NHT:CVE-2024-26608<
https://gitee.com/open_euler/dashboard?issue_id=I97NHT
> kernel 4 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I9A7Y2:CVE-2023-50967<
https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2
> jose 2.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 #I9BV23:CVE-2024-26644<
https://gitee.com/open_euler/dashboard?issue_id=I9BV23
> kernel 1 #I9DD86:CVE-2024-26654<
https://gitee.com/open_euler/dashboard?issue_id=I9DD86
> kernel 1 #I9E2EQ:CVE-2024-26696<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ
> kernel 1 #I9E2M9:CVE-2024-26773<
https://gitee.com/open_euler/dashboard?issue_id=I9E2M9
> kernel 1 #I9E46I:CVE-2024-26788<
https://gitee.com/open_euler/dashboard?issue_id=I9E46I
> kernel 1 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I9EWHR:tbl访问未初始化的内存<
https://gitee.com/open_euler/dashboard?issue_id=I9EWHR
> groff #I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<
https://gitee.com/open_euler/dashboard?issue_id=I90ZB5
> kernel #I92AK4:支持获取minor版本号,以便支持mpam v0.1版本<
https://gitee.com/open_euler/dashboard?issue_id=I92AK4
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/open_euler/dashboard?issue_id=I97HJA
> kernel 热补丁: 仓库 CVE score kernel CVE-2024-1086 7.8 openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 sig组 关联仓库 任务路径 openEuler-22.03-LTS-SP2-round-2 I795G3 【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common 主要 sig/sig-CloudNative src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC I7AFIR 【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足 主要 sig-AccLib src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018 I89NB0 22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本 次要 sig/sig-SDS src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2 I7B6X5 gcc-pie-arm64架构和操作手册结果不同 无优先级 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240410 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题13个,已知漏洞99个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Y?from=project-i…
CVE修复: CVE 仓库 score #I58YVD:CVE-2022-1802<
https://gitee.com/open_euler/dashboard?issue_id=I58YVD
> firefox 8.8 #I9AO3J:CVE-2022-31163<
https://gitee.com/open_euler/dashboard?issue_id=I9AO3J
> rubygem-tzinfo 8.1 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I9AVQD:CVE-2021-32142<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQD
> LibRaw 7.8 #I8YV0T:CVE-2024-23307<
https://gitee.com/open_euler/dashboard?issue_id=I8YV0T
> kernel 7.8 #I95LPF:CVE-2024-26622<
https://gitee.com/open_euler/dashboard?issue_id=I95LPF
> kernel 7.8 #I96G7N:CVE-2023-52600<
https://gitee.com/open_euler/dashboard?issue_id=I96G7N
> kernel 7.8 #I96GXM:CVE-2024-26625<
https://gitee.com/open_euler/dashboard?issue_id=I96GXM
> kernel 7.8 #I990AF:CVE-2021-47131<
https://gitee.com/open_euler/dashboard?issue_id=I990AF
> kernel 7.8 #I9AUYL:CVE-2022-24999<
https://gitee.com/open_euler/dashboard?issue_id=I9AUYL
> nodejs-qs 7.5 #I9ACE0:CVE-2024-2002<
https://gitee.com/open_euler/dashboard?issue_id=I9ACE0
> libdwarf 7.5 #I9ASUL:CVE-2022-2309<
https://gitee.com/open_euler/dashboard?issue_id=I9ASUL
> libxml2 7.5 #I9AVYL:CVE-2022-48279<
https://gitee.com/open_euler/dashboard?issue_id=I9AVYL
> mod_security 7.5 #I9AWCO:CVE-2022-39028<
https://gitee.com/open_euler/dashboard?issue_id=I9AWCO
> telnet 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I99JOA:CVE-2024-1013<
https://gitee.com/open_euler/dashboard?issue_id=I99JOA
> unixODBC 7.1 #I949C5:CVE-2021-46952<
https://gitee.com/open_euler/dashboard?issue_id=I949C5
> kernel 7.1 #I96G7F:CVE-2023-52599<
https://gitee.com/open_euler/dashboard?issue_id=I96G7F
> kernel 7.1 #I96GQ3:CVE-2023-52601<
https://gitee.com/open_euler/dashboard?issue_id=I96GQ3
> kernel 7.1 #I95AXP:CVE-2023-52502<
https://gitee.com/open_euler/dashboard?issue_id=I95AXP
> kernel 7 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9AW6M:CVE-2023-0666<
https://gitee.com/open_euler/dashboard?issue_id=I9AW6M
> wireshark 6.5 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I99JV2:CVE-2024-26641<
https://gitee.com/open_euler/dashboard?issue_id=I99JV2
> kernel 6.1 #I95RDW:CVE-2021-47101<
https://gitee.com/open_euler/dashboard?issue_id=I95RDW
> kernel 6 #I96G8W:CVE-2023-52587<
https://gitee.com/open_euler/dashboard?issue_id=I96G8W
> kernel 6 #I8OJ8L:CVE-2023-37328<
https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L
> gstreamer1-plugins-base 5.5 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-26600<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I93LMH:CVE-2021-46904<
https://gitee.com/open_euler/dashboard?issue_id=I93LMH
> kernel 5.5 #I94JCO:CVE-2021-46989<
https://gitee.com/open_euler/dashboard?issue_id=I94JCO
> kernel 5.5 #I94JH2:CVE-2020-36780<
https://gitee.com/open_euler/dashboard?issue_id=I94JH2
> kernel 5.5 #I95B1F:CVE-2023-52509<
https://gitee.com/open_euler/dashboard?issue_id=I95B1F
> kernel 5.5 #I9909R:CVE-2021-47113<
https://gitee.com/open_euler/dashboard?issue_id=I9909R
> kernel 5.5 #I9909V:CVE-2021-47114<
https://gitee.com/open_euler/dashboard?issue_id=I9909V
> kernel 5.5 #I990A7:CVE-2021-47122<
https://gitee.com/open_euler/dashboard?issue_id=I990A7
> kernel 5.5 #I95REH:CVE-2021-47091<
https://gitee.com/open_euler/dashboard?issue_id=I95REH
> kernel 5.5 #I99K08:CVE-2024-26633<
https://gitee.com/open_euler/dashboard?issue_id=I99K08
> kernel 5.5 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I947PH:CVE-2021-46928<
https://gitee.com/open_euler/dashboard?issue_id=I947PH
> kernel 4.4 #I947U7:CVE-2021-46935<
https://gitee.com/open_euler/dashboard?issue_id=I947U7
> kernel 4.4 #I947OW:CVE-2021-46924<
https://gitee.com/open_euler/dashboard?issue_id=I947OW
> kernel 4.3 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I947SE:CVE-2021-46934<
https://gitee.com/open_euler/dashboard?issue_id=I947SE
> kernel 3.3 #I949D9:CVE-2020-36777<
https://gitee.com/open_euler/dashboard?issue_id=I949D9
> kernel 3.3 #I94JHY:CVE-2020-36784<
https://gitee.com/open_euler/dashboard?issue_id=I94JHY
> kernel 3.3 #I990AA:CVE-2021-47112<
https://gitee.com/open_euler/dashboard?issue_id=I990AA
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I9A7Y2:CVE-2023-50967<
https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2
> jose 2.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 #I9BGUB:CVE-2021-47142<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUB
> kernel 1 #I9BGMR:CVE-2021-47143<
https://gitee.com/open_euler/dashboard?issue_id=I9BGMR
> kernel 1 #I9BGUR:CVE-2021-47144<
https://gitee.com/open_euler/dashboard?issue_id=I9BGUR
> kernel 1 #I9BGQL:CVE-2021-47145<
https://gitee.com/open_euler/dashboard?issue_id=I9BGQL
> kernel 1 #I9BGV4:CVE-2021-47146<
https://gitee.com/open_euler/dashboard?issue_id=I9BGV4
> kernel 1 #I9BGKK:CVE-2021-47149<
https://gitee.com/open_euler/dashboard?issue_id=I9BGKK
> kernel 1 #I9BGVY:CVE-2021-47150<
https://gitee.com/open_euler/dashboard?issue_id=I9BGVY
> kernel 1 #I9BGWP:CVE-2021-47153<
https://gitee.com/open_euler/dashboard?issue_id=I9BGWP
> kernel 1 #I9BHSG:CVE-2021-47159<
https://gitee.com/open_euler/dashboard?issue_id=I9BHSG
> kernel 1 #I9BHG2:CVE-2021-47160<
https://gitee.com/open_euler/dashboard?issue_id=I9BHG2
> kernel 1 #I9BHF9:CVE-2021-47162<
https://gitee.com/open_euler/dashboard?issue_id=I9BHF9
> kernel 1 #I9BHRY:CVE-2021-47163<
https://gitee.com/open_euler/dashboard?issue_id=I9BHRY
> kernel 1 #I9BHTI:CVE-2021-47167<
https://gitee.com/open_euler/dashboard?issue_id=I9BHTI
> kernel 1 #I9BHLP:CVE-2021-47169<
https://gitee.com/open_euler/dashboard?issue_id=I9BHLP
> kernel 1 #I9BHQL:CVE-2021-47170<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQL
> kernel 1 #I9BHNM:CVE-2021-47171<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNM
> kernel 1 #I9BHNX:CVE-2021-47173<
https://gitee.com/open_euler/dashboard?issue_id=I9BHNX
> kernel 1 #I9BHQ7:CVE-2021-47180<
https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7
> kernel 1 #I9AK6C:CVE-2023-52620<
https://gitee.com/open_euler/dashboard?issue_id=I9AK6C
> kernel 1 #I9BV4P:CVE-2023-52622<
https://gitee.com/open_euler/dashboard?issue_id=I9BV4P
> kernel 1 #I9CTGE:CVE-2023-52629<
https://gitee.com/open_euler/dashboard?issue_id=I9CTGE
> kernel 1 #I9AK56:CVE-2024-26642<
https://gitee.com/open_euler/dashboard?issue_id=I9AK56
> kernel 1 #I9BV23:CVE-2024-26644<
https://gitee.com/open_euler/dashboard?issue_id=I9BV23
> kernel 1 #I9BV24:CVE-2024-26645<
https://gitee.com/open_euler/dashboard?issue_id=I9BV24
> kernel 1 #I9C6FA:CVE-2024-26651<
https://gitee.com/open_euler/dashboard?issue_id=I9C6FA
> kernel 1 #I9DD86:CVE-2024-26654<
https://gitee.com/open_euler/dashboard?issue_id=I9DD86
> kernel 1 #I9DNPD:CVE-2024-26668<
https://gitee.com/open_euler/dashboard?issue_id=I9DNPD
> kernel 1 #I9E2O0:CVE-2024-26751<
https://gitee.com/open_euler/dashboard?issue_id=I9E2O0
> kernel 1 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<
https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH
> kernel #I9355O:keys: safe concurrent user->{session,uid}_keyring access<
https://gitee.com/open_euler/dashboard?issue_id=I9355O
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/open_euler/dashboard?issue_id=I97HJA
> kernel #I991GQ:crypto: algif_aead - fix uninitialized ctx->init<
https://gitee.com/open_euler/dashboard?issue_id=I991GQ
> kernel #I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<
https://gitee.com/open_euler/dashboard?issue_id=I992IL
> kernel #I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<
https://gitee.com/open_euler/dashboard?issue_id=I9ARW6
> kernel #I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<
https://gitee.com/open_euler/dashboard?issue_id=I9AZFU
> kernel #I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<
https://gitee.com/open_euler/dashboard?issue_id=I9BD67
> kernel #I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<
https://gitee.com/open_euler/dashboard?issue_id=I9BWES
> kernel #I9C0QZ:mlock 溢出没有返回失败<
https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ
> kernel #I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<
https://gitee.com/open_euler/dashboard?issue_id=I9D6UN
> kernel #I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<
https://gitee.com/open_euler/dashboard?issue_id=I9DOVK
> kernel openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-20.03-LTS-SP4-round-1 I8DT5M 【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败 主要 sig/bigdata src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1 I8EKUI 【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败 主要 sig/sig-security-fac src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2 I8GDGR 【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住 主要 sig/GNOME src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha I8B7XU 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 主要 sig/oVirt src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2 I8G371 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 次要 sig/DB src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild I8GUMP [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything 不重要 sig/Networking src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild I8I8DQ [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol 不重要 sig/sig-mate-desktop src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240410 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题20个,已知漏洞75个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1T?from=project-i…
CVE修复: CVE 仓库 score #I9C6X1:CVE-2024-3019<
https://gitee.com/open_euler/dashboard?issue_id=I9C6X1
> pcp 8.8 #I92HWD:CVE-2024-24474<
https://gitee.com/open_euler/dashboard?issue_id=I92HWD
> qemu 8.2 #I9ATGS:CVE-2022-2469<
https://gitee.com/open_euler/dashboard?issue_id=I9ATGS
> libgsasl 8.1 #I4BI7U:CVE-2019-25051<
https://gitee.com/open_euler/dashboard?issue_id=I4BI7U
> aspell 7.8 #I9AURJ:CVE-2022-2639<
https://gitee.com/open_euler/dashboard?issue_id=I9AURJ
> openvswitch 7.8 #I9E4NC:CVE-2024-31083<
https://gitee.com/open_euler/dashboard?issue_id=I9E4NC
> xorg-x11-server 7.8 #I932VH:CVE-2024-26589<
https://gitee.com/open_euler/dashboard?issue_id=I932VH
> kernel 7.8 #I89S5X:CVE-2023-45675<
https://gitee.com/open_euler/dashboard?issue_id=I89S5X
> stb 7.8 #I9AWCO:CVE-2022-39028<
https://gitee.com/open_euler/dashboard?issue_id=I9AWCO
> telnet 7.5 #I8X4FZ:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ
> cri-o 7.5 #I977K3:CVE-2024-28757<
https://gitee.com/open_euler/dashboard?issue_id=I977K3
> expat 7.5 #I9B1O1:CVE-2024-24784<
https://gitee.com/open_euler/dashboard?issue_id=I9B1O1
> golang 7.5 #I9B1Y1:CVE-2024-30156<
https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1
> varnish 7.5 #I8X4FY:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4FY
> ignition 7.5 #I9E2PZ:CVE-2024-27316<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ
> mod_http2 7.5 #I8X4G2:CVE-2023-39325<
https://gitee.com/open_euler/dashboard?issue_id=I8X4G2
> cri-tools 7.5 #I9B1P4:CVE-2024-24786<
https://gitee.com/open_euler/dashboard?issue_id=I9B1P4
> cri-tools 7.5 #I9E4AM:CVE-2024-31082<
https://gitee.com/open_euler/dashboard?issue_id=I9E4AM
> xorg-x11-server 7.3 #I9E4N0:CVE-2024-31081<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N0
> xorg-x11-server 7.3 #I9E4N4:CVE-2024-31080<
https://gitee.com/open_euler/dashboard?issue_id=I9E4N4
> xorg-x11-server 7.3 #I96GQ3:CVE-2023-52601<
https://gitee.com/open_euler/dashboard?issue_id=I96GQ3
> kernel 7.1 #I9DGZJ:CVE-2024-28219<
https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ
> python-pillow 6.7 #I94K6R:CVE-2023-23601<
https://gitee.com/open_euler/dashboard?issue_id=I94K6R
> mozjs78 6.5 #I94K6T:CVE-2023-23599<
https://gitee.com/open_euler/dashboard?issue_id=I94K6T
> mozjs78 6.5 #I9C342:CVE-2024-2398<
https://gitee.com/open_euler/dashboard?issue_id=I9C342
> curl 6.5 #I9AVQ9:CVE-2023-28100<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9
> flatpak 6.5 #I93ED1:CVE-2023-52454<
https://gitee.com/open_euler/dashboard?issue_id=I93ED1
> kernel 6.5 #I9AMRI:CVE-2022-32325<
https://gitee.com/open_euler/dashboard?issue_id=I9AMRI
> jpegoptim 6.5 #I9AH6G:CVE-2024-2494<
https://gitee.com/open_euler/dashboard?issue_id=I9AH6G
> libvirt 6.2 #I99JV2:CVE-2024-26641<
https://gitee.com/open_euler/dashboard?issue_id=I99JV2
> kernel 6.1 #I95RDW:CVE-2021-47101<
https://gitee.com/open_euler/dashboard?issue_id=I95RDW
> kernel 6 #I9AYAU:CVE-2023-48795<
https://gitee.com/open_euler/dashboard?issue_id=I9AYAU
> cri-o 5.9 #I9138X:CVE-2023-52426<
https://gitee.com/open_euler/dashboard?issue_id=I9138X
> expat 5.5 #I932W7:CVE-2023-52443<
https://gitee.com/open_euler/dashboard?issue_id=I932W7
> kernel 5.5 #I93HCX:CVE-2024-2660<
https://gitee.com/open_euler/dashboard?issue_id=I93HCX
> kernel 5.5 #I94OZS:CVE-2023-52484<
https://gitee.com/open_euler/dashboard?issue_id=I94OZS
> kernel 5.5 #I94P2I:CVE-2023-52479<
https://gitee.com/open_euler/dashboard?issue_id=I94P2I
> kernel 5.5 #I99K08:CVE-2024-26633<
https://gitee.com/open_euler/dashboard?issue_id=I99K08
> kernel 5.5 #I97N53:CVE-2024-1441<
https://gitee.com/open_euler/dashboard?issue_id=I97N53
> libvirt 5.5 #I93X74:CVE-2024-26144<
https://gitee.com/open_euler/dashboard?issue_id=I93X74
> rubygem-activestorage 5.3 #I9DFPV:CVE-2023-7250<
https://gitee.com/open_euler/dashboard?issue_id=I9DFPV
> iperf3 5.3 #I9E2PU:CVE-2024-28182<
https://gitee.com/open_euler/dashboard?issue_id=I9E2PU
> nghttp2 5.3 #I9AH1K:CVE-2024-28834<
https://gitee.com/open_euler/dashboard?issue_id=I9AH1K
> gnutls 5.3 #I9E8PU:CVE-2024-21506<
https://gitee.com/open_euler/dashboard?issue_id=I9E8PU
> python-pymongo 5.2 #I9BJ5S:CVE-2024-30204<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S
> emacs 5 #I9BJ5X:CVE-2024-30205<
https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X
> emacs 5 #I92REM:CVE-2024-26585<
https://gitee.com/open_euler/dashboard?issue_id=I92REM
> kernel 4.7 #I93ELY:CVE-2024-26593<
https://gitee.com/open_euler/dashboard?issue_id=I93ELY
> kernel 4.7 #I94P3R:CVE-2023-52476<
https://gitee.com/open_euler/dashboard?issue_id=I94P3R
> kernel 4.7 #I9AJ87:CVE-2024-27281<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ87
> ruby 4.5 #I93L72:CVE-2023-52469<
https://gitee.com/open_euler/dashboard?issue_id=I93L72
> kernel 4.4 #I93L7E:CVE-2023-52467<
https://gitee.com/open_euler/dashboard?issue_id=I93L7E
> kernel 4.4 #I93X0G:CVE-2024-26606<
https://gitee.com/open_euler/dashboard?issue_id=I93X0G
> kernel 4.4 #I94K5J:CVE-2021-47037<
https://gitee.com/open_euler/dashboard?issue_id=I94K5J
> kernel 4.4 #I93ED4:CVE-2023-52462<
https://gitee.com/open_euler/dashboard?issue_id=I93ED4
> kernel 4.4 #I99JXH:CVE-2023-52617<
https://gitee.com/open_euler/dashboard?issue_id=I99JXH
> kernel 4.4 #I9AVQ7:CVE-2023-28101<
https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7
> flatpak 4.3 #I93EDC:CVE-2023-52457<
https://gitee.com/open_euler/dashboard?issue_id=I93EDC
> kernel 4.2 #I93EEE:CVE-2023-52456<
https://gitee.com/open_euler/dashboard?issue_id=I93EEE
> kernel 4 #I97NHT:CVE-2024-26608<
https://gitee.com/open_euler/dashboard?issue_id=I97NHT
> kernel 4 #I98BNA:CVE-2023-52608<
https://gitee.com/open_euler/dashboard?issue_id=I98BNA
> kernel 4 #I93EDF:CVE-2024-26597<
https://gitee.com/open_euler/dashboard?issue_id=I93EDF
> kernel 3.3 #I9AJ8A:CVE-2024-27280<
https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A
> ruby 3.1 #I9A7Y2:CVE-2023-50967<
https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2
> jose 2.5 #I947TK:CVE-2021-46926<
https://gitee.com/open_euler/dashboard?issue_id=I947TK
> kernel 2.3 #I9BV23:CVE-2024-26644<
https://gitee.com/open_euler/dashboard?issue_id=I9BV23
> kernel 1 #I9C6FA:CVE-2024-26651<
https://gitee.com/open_euler/dashboard?issue_id=I9C6FA
> kernel 1 #I9DD86:CVE-2024-26654<
https://gitee.com/open_euler/dashboard?issue_id=I9DD86
> kernel 1 #I9DNMI:CVE-2024-26680<
https://gitee.com/open_euler/dashboard?issue_id=I9DNMI
> kernel 1 #I9DNPD:CVE-2024-26668<
https://gitee.com/open_euler/dashboard?issue_id=I9DNPD
> kernel 1 #I9DNRC:CVE-2024-26679<
https://gitee.com/open_euler/dashboard?issue_id=I9DNRC
> kernel 1 #I9DNRR:CVE-2023-52633<
https://gitee.com/open_euler/dashboard?issue_id=I9DNRR
> kernel 1 #I9E2EQ:CVE-2024-26696<
https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ
> kernel 1 #I9E2MG:CVE-2024-26777<
https://gitee.com/open_euler/dashboard?issue_id=I9E2MG
> kernel 1 #I9E46I:CVE-2024-26788<
https://gitee.com/open_euler/dashboard?issue_id=I9E46I
> kernel 1 Bugfix: issue 仓库 #I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<
https://gitee.com/open_euler/dashboard?issue_id=I9C04M
> gssproxy #I9EQWC:gcc for openEuler 支持SME ACLE intrinsic 指令及操作系统提供的ABI<
https://gitee.com/open_euler/dashboard?issue_id=I9EQWC
> gcc-12 #I9EQYZ:binutils 支持aarch64 SME指令<
https://gitee.com/open_euler/dashboard?issue_id=I9EQYZ
> binutils #I9ESZG:添加hip11 CPU流水线调度<
https://gitee.com/open_euler/dashboard?issue_id=I9ESZG
> gcc #I9EWHR:tbl访问未初始化的内存<
https://gitee.com/open_euler/dashboard?issue_id=I9EWHR
> groff #I9F66J:poissonsearch-oss从epol挪到everything<
https://gitee.com/open_euler/dashboard?issue_id=I9F66J
> poissonsearch-oss #I9F69C:poissonsearch-py从epol挪到everything<
https://gitee.com/open_euler/dashboard?issue_id=I9F69C
> poissonsearch-py #I9DE8T:[22.03 SP3][codedb]-march=armv8.5-a+sme选项导致POM_POM2K编译ICE: in compute_live_loop_exits, at tree-ssa-loop-manip.cc:247<
https://gitee.com/open_euler/dashboard?issue_id=I9DE8T
> gcc-12 #I9D2TO:CPU核数超过248时,PWR_CPU_GetFreq接口会导致服务端coredump<
https://gitee.com/open_euler/dashboard?issue_id=I9D2TO
> powerapi #I9DR1P:powerapi中使用ipmitool,但是不在requires中<
https://gitee.com/open_euler/dashboard?issue_id=I9DR1P
> powerapi #I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<
https://gitee.com/open_euler/dashboard?issue_id=I90ZB5
> kernel #I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<
https://gitee.com/open_euler/dashboard?issue_id=I97HJA
> kernel #I98AT9:【OLK-5.10】打开vhost-vdpa设备异常时,没有判断返回值,直接推出,导致vhost_vdpa设备不能再次使用,也不能卸载驱动<
https://gitee.com/open_euler/dashboard?issue_id=I98AT9
> kernel #I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<
https://gitee.com/open_euler/dashboard?issue_id=I9ARW6
> kernel #I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降<
https://gitee.com/open_euler/dashboard?issue_id=I9BBFQ
> kernel #I9COT9:cpuinfo_cur_freq 在高访存压力下,出现获取频率值误差过大,导致结果错误<
https://gitee.com/open_euler/dashboard?issue_id=I9COT9
> kernel #I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<
https://gitee.com/open_euler/dashboard?issue_id=I9D6UN
> kernel #I9DFT4:Backport 5.10.201 LTS patches from upstream<
https://gitee.com/open_euler/dashboard?issue_id=I9DFT4
> kernel #I9EEIG:smmu_v3 ecmdq代码逻辑存在问题<
https://gitee.com/open_euler/dashboard?issue_id=I9EEIG
> kernel #I9EMR9:[OLK 5.10] NIC 补丁回合<
https://gitee.com/open_euler/dashboard?issue_id=I9EMR9
> kernel openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高): 里程碑 任务ID 任务标题 优先级 标签 关联仓库 任务路径 openEuler-22.03-LTS-SP3 I96ID7 [22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp 主要 sig/Compiler src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.12日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG issue码云链接 CVE-2024-24576 I9FBQX 5.23 10.0 rust sig-Rust
https://gitee.com/src-openeuler/rust/issues/I9FBQX
CVE-2023-41419 I84A04 5.55 9.8 python-gevent Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2023-51698 I9F7X1 11.23 8.8 evince GNOME
https://gitee.com/src-openeuler/evince/issues/I9F7X1
CVE-2024-3446 I9FBRQ 12.23 8.2 qemu Virt
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
CVE-2024-31083 I9E4N6 7.23 7.8 xorg-x11-server-xwayland Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N6
CVE-2021-47131 I990AF 9.57 7.8 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AF
CVE-2024-26256 I9FBQR 12.23 7.8 libarchive Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FBQR
CVE-2023-50868 I9B0OI 0.65 7.5 dhcp Networking
https://gitee.com/src-openeuler/dhcp/issues/I9B0OI
CVE-2024-31309 I9E2OB 9.48 7.5 trafficserver Networking
https://gitee.com/src-openeuler/trafficserver/issues/I9E2OB
CVE-2023-45288 I9E2PR 10.82 7.5 golang sig-golang
https://gitee.com/src-openeuler/golang/issues/I9E2PR
CVE-2022-34169 I9F7Q2 11.23 7.5 icedtea-web Compiler
https://gitee.com/src-openeuler/icedtea-web/issues/I9F7Q2
CVE-2023-50387 I9F7ML 11.23 7.5 systemd Base-service
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
CVE-2024-20932 I9F7I0 11.23 7.5 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
CVE-2024-24786 I9B1P2 11.82 7.5 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1P2
CVE-2024-20918 I9F7K6 11.23 7.4 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
CVE-2024-20952 I9F7GS 11.23 7.4 openjdk-17 Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7GS
CVE-2024-31080 I9E4NE 6.23 7.3 xorg-x11-server-xwayland Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4NE
CVE-2024-31081 I9E4N7 6.23 7.3 xorg-x11-server-xwayland Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N7
CVE-2021-47084 I95REJ 12.57 6.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REJ
CVE-2023-52524 I95B1R 12.57 6.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1R
CVE-2021-46959 I94VP1 12.57 6.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VP1
CVE-2021-47063 I94VOL 12.57 6.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOL
CVE-2022-2447 I9AQ5D 9.23 6.6 openstack-keystone sig-openstack
https://gitee.com/src-openeuler/openstack-keystone/issues/I9AQ5D
CVE-2023-28100 I9AVQ9 9.23 6.5 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2022-2553 I9AO7E 9.23 6.5 booth sig-Ha
https://gitee.com/src-openeuler/booth/issues/I9AO7E
CVE-2023-28746 I9AJ86 9.23 6.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ86
CVE-2023-39368 I9B1R3 11.23 6.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R3
CVE-2022-47950 I9B1HJ 11.23 6.5 python-swiftclient sig-openstack
https://gitee.com/src-openeuler/python-swiftclient/issues/I9B1HJ
CVE-2019-25162 I93XA4 5.82 6.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I93XA4
CVE-2021-47083 I95RE4 12.57 6.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE4
CVE-2023-52587 I96G8W 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8W
CVE-2023-52598 I96G7Q 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
CVE-2021-46984 I96DIN 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96DIN
CVE-2021-47105 I95RGH 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGH
CVE-2021-47098 I95RFQ 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RFQ
CVE-2021-47095 I95REK 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REK
CVE-2021-47099 I95RE7 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE7
CVE-2021-47097 I95RDY 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDY
CVE-2021-47101 I95RDW 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDW
CVE-2023-52529 I95AVL 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AVL
CVE-2023-52519 I95ASU 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASU
CVE-2023-52510 I95ASM 12.57 6.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASM
CVE-2024-29018 I9A82U 8.23 5.9 docker sig-CloudNative
https://gitee.com/src-openeuler/docker/issues/I9A82U
CVE-2023-52323 I9AZF2 10.23 5.9 fence-agents sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9AZF2
CVE-2023-48795 I9AYAU 10.23 5.9 cri-o sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2023-48795 I9AYAQ 10.23 5.9 libssh2 Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-29018 I9AWX6 10.23 5.9 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AWX6
CVE-2024-29018 I9AWWE 10.23 5.9 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AWWE
CVE-2024-29018 I9AWLZ 10.23 5.9 cri-tools sig-CloudNative
https://gitee.com/src-openeuler/cri-tools/issues/I9AWLZ
CVE-2022-47951 I9AVCJ 9.23 5.7 openstack-glance sig-openstack
https://gitee.com/src-openeuler/openstack-glance/issues/I9AVCJ
CVE-2022-47951 I9AVCG 9.23 5.7 openstack-nova sig-openstack
https://gitee.com/src-openeuler/openstack-nova/issues/I9AVCG
CVE-2023-52507 I95B1K 12.57 5.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1K
CVE-2021-47055 I94VON 12.57 5.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VON
CVE-2023-52575 I95AT9 12.57 5.6 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT9
CVE-2021-46991 I94K17 5.82 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K17
CVE-2021-46945 I949C7 5.82 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C7
CVE-2021-46963 I949BI 5.82 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I949BI
CVE-2021-46917 I944GE 5.82 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I944GE
CVE-2023-52464 I93EBW 5.82 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I93EBW
CVE-2022-2806 I9AR03 9.23 5.5 sos Base-service
https://gitee.com/src-openeuler/sos/issues/I9AR03
CVE-2022-1962 I9AN6B 9.23 5.5 skopeo sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AN6B
CVE-2022-1962 I9AN5R 9.23 5.5 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AN5R
CVE-2022-1962 I9B0A3 10.23 5.5 libslirp CloudNative
https://gitee.com/src-openeuler/libslirp/issues/I9B0A3
CVE-2022-1962 I9B08Y 10.23 5.5 fuse-overlayfs CloudNative
https://gitee.com/src-openeuler/fuse-overlayfs/issues/I9B08Y
CVE-2022-1962 I9B08S 10.23 5.5 slirp4netns CloudNative
https://gitee.com/src-openeuler/slirp4netns/issues/I9B08S
CVE-2022-1962 I9B08R 10.23 5.5 containers-common sig-CloudNative
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
CVE-2022-1962 I9AXMR 10.23 5.5 crun sig-CloudNative
https://gitee.com/src-openeuler/crun/issues/I9AXMR
CVE-2022-1962 I9AXMJ 10.23 5.5 container-selinux sig-CloudNative
https://gitee.com/src-openeuler/container-selinux/issues/I9AXMJ
CVE-2023-38575 I9B1R5 11.23 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R5
CVE-2022-1962 I9B1QW 11.23 5.5 etcd sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1QW
CVE-2023-52607 I96GP1 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GP1
CVE-2023-52583 I96G92 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G92
CVE-2022-48629 I963KI 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I963KI
CVE-2021-47104 I95RGF 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGF
CVE-2021-47106 I95RG2 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG2
CVE-2021-47103 I95REP 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REP
CVE-2021-47090 I95REF 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REF
CVE-2021-47092 I95REC 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REC
CVE-2021-47096 I95RE2 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE2
CVE-2023-52503 I95B3Q 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
CVE-2023-52520 I95B2M 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2M
CVE-2023-52501 I95B10 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B10
CVE-2024-26621 I95B0Y 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B0Y
CVE-2023-52532 I95AXS 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXS
CVE-2023-52516 I95AXL 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXL
CVE-2023-52521 I95AWP 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWP
CVE-2023-52522 I95AWK 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWK
CVE-2023-52574 I95ATZ 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
CVE-2023-52578 I95ATV 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATV
CVE-2023-52581 I95ATS 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATS
CVE-2023-52562 I95ATR 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATR
CVE-2023-52564 I95ATP 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATP
CVE-2023-52559 I95ATH 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATH
CVE-2023-52580 I95ATC 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATC
CVE-2023-52576 I95AT8 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT8
CVE-2023-52566 I95AT5 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT5
CVE-2023-52569 I95AT1 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT1
CVE-2023-52504 I95AT0 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT0
CVE-2023-52523 I95ASW 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASW
CVE-2023-52530 I95ASP 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASP
CVE-2021-47077 I956GS 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GS
CVE-2021-47056 I94VOZ 12.57 5.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOZ
CVE-2023-22081 I88VNW 8.14 5.3 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2022-4122 I9ATC3 9.23 5.3 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATC3
CVE-2023-43490 I9AJ89 9.23 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ89
CVE-2023-39326 I9AY6T 10.23 5.3 promu sig-CloudNative
https://gitee.com/src-openeuler/promu/issues/I9AY6T
CVE-2023-3817 I9AWVX 10.23 5.3 edk2 Virt
https://gitee.com/src-openeuler/edk2/issues/I9AWVX
CVE-2023-39326 I9B1Q3 11.23 5.3 toolbox CloudNative
https://gitee.com/src-openeuler/toolbox/issues/I9B1Q3
CVE-2021-47078 I956GP 12.57 5.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GP
CVE-2024-20978 I9B0DW 10.23 4.9 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0DW
CVE-2024-20976 I9B0CE 10.23 4.9 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0CE
CVE-2022-0207 I9AL0Y 9.23 4.7 vdsm oVirt
https://gitee.com/src-openeuler/vdsm/issues/I9AL0Y
CVE-2023-52597 I96GPO 12.57 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPO
CVE-2021-47069 I956FU 12.57 4.7 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FU
CVE-2021-46972 I949C0 5.82 4.6 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C0
CVE-2023-52477 I94P5J 5.82 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P5J
CVE-2022-48626 I93LMF 5.82 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMF
CVE-2022-21595 I9AT7H 9.23 4.4 mariadb DB
https://gitee.com/src-openeuler/mariadb/issues/I9AT7H
CVE-2023-52595 I96GO9 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GO9
CVE-2023-52589 I96GNU 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNU
CVE-2023-52605 I96G8V 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8V
CVE-2023-52585 I96G80 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G80
CVE-2023-52594 I96G7W 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7W
CVE-2021-47082 I95REN 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REN
CVE-2021-47100 I95RE3 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE3
CVE-2023-52513 I95AWN 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWN
CVE-2022-48627 I95ATI 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATI
CVE-2022-48628 I95ASY 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASY
CVE-2023-52508 I95ASN 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASN
CVE-2021-47079 I956GR 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GR
CVE-2021-47071 I956GH 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GH
CVE-2021-47081 I956GE 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GE
CVE-2021-47074 I956G7 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G7
CVE-2021-47070 I956G4 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G4
CVE-2021-47075 I956G0 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G0
CVE-2021-47080 I956FR 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FR
CVE-2021-47062 I94VOY 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOY
CVE-2021-47065 I94VOU 12.57 4.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOU
CVE-2023-28101 I9AVQ7 9.23 4.3 flatpak Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-52567 I95ATO 12.57 4.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATO
CVE-2023-52573 I95ATK 12.57 4.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATK
CVE-2023-52568 I95ATJ 12.57 4.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATJ
CVE-2023-52570 I95AT2 12.57 4.1 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT2
CVE-2021-46905 I93LMJ 5.82 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMJ
CVE-2021-46994 I94JCA 12.82 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCA
CVE-2023-52592 I96GPQ 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPQ
CVE-2023-52590 I96GNO 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNO
CVE-2024-26623 I96G9F 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G9F
CVE-2023-52596 I96G7I 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7I
CVE-2021-47108 I95RG5 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG5
CVE-2021-47085 I95RET 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RET
CVE-2021-47093 I95REL 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REL
CVE-2021-47087 I95REA 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REA
CVE-2023-52500 I95B2S 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2S
CVE-2023-52512 I95B2K 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2K
CVE-2023-52515 I95B1O 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1O
CVE-2023-52511 I95B18 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B18
CVE-2023-52526 I95AXJ 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXJ
CVE-2023-52525 I95AXH 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXH
CVE-2023-52531 I95AWI 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWI
CVE-2023-52572 I95AUA 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AUA
CVE-2023-52563 I95ATY 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATY
CVE-2023-52579 I95ATT 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATT
CVE-2023-52506 I95ATE 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATE
CVE-2023-52582 I95ATA 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATA
CVE-2023-52577 I95AT6 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT6
CVE-2023-52505 I95AST 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AST
CVE-2023-52499 I95ASQ 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASQ
CVE-2021-47072 I956GA 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GA
CVE-2021-47016 I94VOW 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOW
CVE-2021-47060 I94VOT 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOT
CVE-2021-47057 I94VOS 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOS
CVE-2021-47067 I94VOA 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOA
CVE-2021-47061 I94VO4 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO4
CVE-2023-52485 I94VEN 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VEN
CVE-2023-52483 I94P64 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P64
CVE-2021-47021 I94K5X 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5X
CVE-2021-47039 I94K5U 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5U
CVE-2021-47048 I94K5S 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5S
CVE-2020-36783 I94JR1 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JR1
CVE-2021-47047 I94JOG 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JOG
CVE-2021-46986 I94JH6 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JH6
CVE-2020-36779 I94JCR 13.57 4.0 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCR
CVE-2023-22025 I88JFX 8.14 3.7 openjdk-latest Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2024-23944 I98QK9 2.23 3.5 zookeeper sig-bigdata
https://gitee.com/src-openeuler/zookeeper/issues/I98QK9
CVE-2023-52571 I95ATW 12.57 3.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATW
CVE-2021-47046 I94K52 12.57 3.5 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K52
CVE-2021-47058 I94VOQ 12.57 3.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOQ
CVE-2021-47066 I94VOC 12.57 3.4 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOC
CVE-2022-4123 I9ATB7 9.23 3.3 podman sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATB7
CVE-2023-52565 I95AU4 12.57 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AU4
CVE-2023-52560 I95ATG 12.57 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATG
CVE-2023-52561 I95ATF 12.57 3.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATF
CVE-2021-46926 I947TK 5.82 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I947TK
CVE-2021-46918 I9453G 5.82 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I9453G
CVE-2021-47054 I94VOR 12.57 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOR
CVE-2021-47059 I94VOI 12.57 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOI
CVE-2021-47064 I94VO6 12.57 2.3 kernel Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO6
社区关键组件待修复缺陷: openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。 社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑): 序号 任务ID 任务标题 任务类型 创建时间 优先级 关联仓库 sig组 任务路径 1 I4V9K0 gcc 10.3.0 __libc_vfork符号丢失(i686架构) 任务 2022/2/25 14:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2 I4YT2R iscsi登录操作并发sysfs读操作概率导致空指针访问 任务 2022/3/21 15:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3 I58CJR 删除iptable_filter.ko时出现空指针问题 任务 2022/5/19 20:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4 I5C33B OLK-5.10 page owner功能增强 任务 2022/6/13 20:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5 I5D9J8 Upgrade to latest release [kernel: 5.10.0 -> 5.17] 任务 2022/6/21 10:01 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6 I5G321 【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic 任务 2022/7/8 9:05 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7 I5H311 修复CVE-2022-2380 任务 2022/7/14 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8 I5I2M8 x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware. 任务 2022/7/21 9:47 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9 I5OOLB 反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397 任务 2022/8/29 20:23 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10 I5PBRB 注入内存申请故障,i40iw_initialize_dev失败时出现oops复位 任务 2022/9/2 9:56 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11 I5RH8C 内存可靠性分级需求 任务 2022/9/16 16:16 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12 I5V92B openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划 任务 2022/10/12 11:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13 I5VCIJ openEuler如何适配新硬件,请提供适配流程指导 任务 2022/10/12 17:14 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14 I5WCP1 回合bpftool prog attach/detach命令 任务 2022/10/18 16:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15 I67IFE 建议sssd拆分出对应功能的子包 任务 2022/12/26 16:49 无优先级 src-openEuler/sssd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I67IFE
16 I6FZWY 主线回合scsi: iscsi_tcp: Fix UAF during logout and login 任务 2023/2/18 11:10 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
17 I6HXB9 kernel.spec中是否会新增打包intel-sst工具 任务 2023/2/27 10:06 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
18 I6MJB4 openssl 3.0 支持TLCP特性 任务 2023/3/13 11:35 无优先级 src-openEuler/openssl sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
19 I6N49D 【openeuler-22.03-LTS-SP】 任务 2023/3/14 20:12 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
20 I6PA84 神威架构,虚拟化启动失败 任务 2023/3/22 17:20 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
21 I6TQ8W curl命令向hadoop3.2.1 webhdfs put文件失败 任务 2023/4/7 18:02 严重 src-openEuler/curl Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
22 I6UDV8 Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp 任务 2023/4/10 16:14 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
23 I6VWNS 主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析 任务 2023/4/15 10:37 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
24 I70VML 指针压缩选项的错误提示内容有误。 缺陷 2023/5/6 16:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
25 I71KX8 python3.spec文件中,无效的ifarch语句 任务 2023/5/9 15:00 无优先级 src-openEuler/python3 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
26 I7A5FW Fixed CPU topology issues and add lbt support for kvm. 任务 2023/6/1 17:18 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
27 I7B6KR kerberos安装缺少krb5-auth-dialog 和 krb5-workstation 任务 2023/6/6 9:51 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
28 I7CKVY peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错 缺陷 2023/6/11 22:45 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
29 I7CWOS Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level 任务 2023/6/12 20:51 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
30 I7EZAZ 无法在sw_64下编译nodejs 任务 2023/6/20 16:50 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
31 I7L968 Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09] 任务 2023/7/14 17:09 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
32 I7LSWG Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03] 任务 2023/7/17 20:50 无优先级 src-openEuler/gtk2 Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
33 I8790J need EPYC-Genoa model support 任务 2023/10/11 16:53 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
34 I8A77R Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01] 任务 2023/10/23 16:22 无优先级 src-openEuler/alsa-lib Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
35 I8KAVR dnf reinstall kernel 导致grub.conf 本内核项被删除 任务 2023/11/29 10:30 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
36 I8ON5A Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13] 任务 2023/12/15 11:04 无优先级 src-openEuler/cronie Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
37 I8ON6X Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21] 任务 2023/12/15 11:06 无优先级 src-openEuler/dbus Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
38 I8OOF1 Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14] 任务 2023/12/15 12:29 无优先级 src-openEuler/krb5 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
39 I8OOF5 Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11] 任务 2023/12/15 12:31 无优先级 src-openEuler/libarchive Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
40 I8PL8Q Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17] 任务 2023/12/19 11:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
41 I8SZWW qemu 4.1 虚拟机热迁移到qemu 6.2失败 任务 2024/1/2 17:01 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
42 I8UCFC 鲲鹏920服务器多次重启后系统盘盘符跳变 任务 2024/1/8 11:18 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
43 I8VIRN Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31] 任务 2024/1/12 9:17 无优先级 src-openEuler/libcap sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
44 I8VIRQ Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13] 任务 2024/1/12 9:17 无优先级 src-openEuler/libselinux sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
45 I8XTDI rpm宏用$引用可能会出现空值 缺陷 2024/1/21 22:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
46 I8ZBUC 主线补丁:crypto: scomp - fix req->dst buffer overflow 任务 2024/1/27 11:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8ZBUC
47 I8ZJG1 欧拉系统virt-install 创建虚拟机video类型默认使用qxl 任务 2024/1/29 10:44 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
48 I95DT3 openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布? 任务 2024/3/4 0:39 无优先级 src-openEuler/qemu Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
49 I96B4W systemd中缺少文件 任务 2024/3/6 14:53 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
50 I96BZU 逻辑卷组修复 任务 2024/3/6 15:36 无优先级 src-openEuler/lvm2 Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
51 I97R4T 【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启 缺陷 2024/3/12 11:36 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97R4T
52 I97V59 preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机 缺陷 2024/3/12 16:09 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
53 I9BJX9 glib2-2.72.2-14 导致gnome 桌面崩溃 缺陷 2024/3/26 9:15 无优先级 src-openEuler/glib2 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9BJX9
54 I9BNUP 使用clang时缺少gnu/stubs-32.h文件 任务 2024/3/26 13:43 无优先级 src-openEuler/glibc Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
55 I9C507 gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化 缺陷 2024/3/27 18:22 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
56 I9COZE 【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式 缺陷 2024/3/29 15:27 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
57 I9CQSL openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡 缺陷 2024/3/29 16:57 无优先级 src-openEuler/kernel Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
58 I9CXWG 当mount挂载点多的时候,systemd-hostnamd服务启动时间太长 任务 2024/3/30 18:58 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9CXWG
59 I9DV2U spec文件不同架构分支存在相同构建方式 任务 2024/4/3 11:24 无优先级 src-openEuler/gcc Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
60 I9EDEH 【22.03 LTS SP1】glib2自编译check阶段用例失败 缺陷 2024/4/7 10:26 无优先级 src-openEuler/glib2 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDEH
61 I9EDQG udev事件接收到磁盘被拔出后,调用umount /home/test卸载磁盘,mount信息中有残留磁盘挂载信息。 缺陷 2024/4/7 10:41 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDQG
62 I9EHLX openEuler22.03 sp1设置成gb18030编码以后,timedatectl 报Eaile to print table:Invalid argument 任务 2024/4/7 14:55 无优先级 src-openEuler/systemd Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EHLX
63 I9EU9I openEuler 24.03 RISC-V中,切换至新建的用户的umask权限没有改变 缺陷 2024/4/8 15:14 无优先级 src-openEuler/bash Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EU9I
64 I9FI38 【obs】glib2在openEuler:22.03:LTS构建失败 缺陷 2024/4/10 15:34 无优先级 src-openEuler/glib2 Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9FI38
65 I9FU1M [openEuler-22.03-LTS] libvirt install failed 任务 2024/4/11 15:44 无优先级 src-openEuler/libvirt Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
66 I9FVI3 22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步 任务 2024/4/11 16:57 无优先级 src-openEuler/e2fsprogs Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
67 I9FYER libcgroup-3.1.0.tar.gz无法正常解压 任务 2024/4/11 21:49 无优先级 src-openEuler/libcgroup sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I9FYER
openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
>
1
0
0
0
Results per page:
10
25
50
100
200