Sign in
Sign up
Explore
Enterprise
Education
Search
Help
Terms of use
About Us
Explore
Enterprise
Education
Gitee Premium
Gitee AI
AI teammates
Sign in
Sign up
Fetch the repository succeeded.
description of repo status
Donate
Please sign in before you donate.
Cancel
Sign in
Scan WeChat QR to Pay
Cancel
Complete
Prompt
Switch to Alipay.
OK
Cancel
Watch
Unwatch
Watching
Releases Only
Ignoring
62
Star
82
Fork
487
openEuler
/
release-management
Closed
Code
Issues
419
Pull Requests
6
Wiki
Insights
Pipelines
Service
JavaDoc
PHPDoc
Quality Analysis
Jenkins for Gitee
Tencent CloudBase
Tencent Cloud Serverless
悬镜安全
Aliyun SAE
Codeblitz
SBOM
DevLens
Don’t show this again
Update failed. Please try again later!
Remove this flag
Content Risk Flag
This task is identified by
as the content contains sensitive information such as code security bugs, privacy leaks, etc., so it is only accessible to contributors of this repository.
openEuler-22.03-LTS-SP4_update20241111 release
Done
#IB3B2Q
Task
openLiBing-bot
Opened this issue
2024-11-11 09:20
版本目标: CVE、软件包引入升级和Bugfix修复<br/>版本: openEuler-22.03-LTS-SP4<br/>例行CVE冻结: 2024-11-13 12:00:00<br/>代码冻结: 2024-11-13 12:00:00<br/><br/>版本发布负责人<br/>版本经理:@randy1568 @yajieli<br/>开发人员:@lyn1001 @jxy_git @sun_hai_10<br/>安全委员会:@zhujianwei001 @luoyukai<br/>测试人员:@Algernon @li-yancheng @wenjunryou<br/><h2>1.发布范围</h2><h3>(1) cve</h3><p>修复CVE 49个</p><table><tr bgcolor="#FFCA28" align="center"><td><b>序号</b></td><td><b>CVE</b></td><td><b>仓库</b></td><td><b>status</b></td><td><b>score</b></td><td><b>version</b></td><td><b>abi是否变化</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>1</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I577EZ>I577EZ:CVE-2022-25762</a></td><td>tomcat</td><td>已完成</td><td>8.6</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>2</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I5TQD3>I5TQD3:CVE-2021-43980</a></td><td>tomcat</td><td>已完成</td><td>3.7</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>3</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I89671>I89671:CVE-2023-44487</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>4</td><td><a href= https://gitee.com/src-openeuler/sbt/issues/I8AB2L>I8AB2L:CVE-2023-46122</a></td><td>sbt</td><td>已完成</td><td>7.1</td><td>0.13.1</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>5</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I8K8Y7>I8K8Y7:CVE-2023-46589</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>6</td><td><a href= https://gitee.com/src-openeuler/woodstox-core/issues/I9AY1I>I9AY1I:CVE-2022-40152</a></td><td>woodstox-core</td><td>已完成</td><td>7.5</td><td>5.0.3,6.2.8</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>7</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I98BWJ>I98BWJ:CVE-2024-23672</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>8</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I98BXD>I98BXD:CVE-2024-24549</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>9</td><td><a href= https://gitee.com/src-openeuler/netty3/issues/I9BJ9R>I9BJ9R:CVE-2024-29025</a></td><td>netty3</td><td>已完成</td><td>5.3</td><td>3.10.6</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>10</td><td><a href= https://gitee.com/src-openeuler/netty/issues/I9BJ9S>I9BJ9S:CVE-2024-29025</a></td><td>netty</td><td>已完成</td><td>5.3</td><td>3.6.2.Final,4.1.13</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>11</td><td><a href= https://gitee.com/src-openeuler/undertow/issues/I9E578>I9E578:CVE-2023-1973</a></td><td>undertow</td><td>已完成</td><td>7.5</td><td>1.4.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>12</td><td><a href= https://gitee.com/src-openeuler/hdf5/issues/I9OLDK>I9OLDK:CVE-2024-29166</a></td><td>hdf5</td><td>已完成</td><td>5.7</td><td>1.10.8,1.12.1,1.8.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>13</td><td><a href= https://gitee.com/src-openeuler/hdf5/issues/I9OLE5>I9OLE5:CVE-2024-32606</a></td><td>hdf5</td><td>已完成</td><td>5.7</td><td>1.10.8,1.12.1,1.8.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>14</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/IAAFZP>IAAFZP:CVE-2024-34750</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>15</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAR49K>IAR49K:CVE-2024-46685</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>16</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAR5FZ>IAR5FZ:CVE-2024-46702</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>17</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAUA64>IAUA64:CVE-2024-46815</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>18</td><td><a href= https://gitee.com/src-openeuler/dhcp/issues/IAUAUD>IAUAUD:CVE-2024-1975</a></td><td>dhcp</td><td>已完成</td><td>7.5</td><td>4.4.2,4.4.3</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>19</td><td><a href= https://gitee.com/src-openeuler/dhcp/issues/IAUAVG>IAUAVG:CVE-2024-1737</a></td><td>dhcp</td><td>已完成</td><td>7.5</td><td>4.4.2,4.4.3</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>20</td><td><a href= https://gitee.com/src-openeuler/mosquitto/issues/IAWFLX>IAWFLX:CVE-2024-8376</a></td><td>mosquitto</td><td>已完成</td><td>8.3</td><td>1.6.15,2.0.15,2.0.16</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>21</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD4Y>IAXD4Y:CVE-2024-21211</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.382.b05,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>22</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD51>IAXD51:CVE-2024-21217</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>23</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD4W>IAXD4W:CVE-2024-21208</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>24</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD5H>IAXD5H:CVE-2024-21235</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>4.8</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>25</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD5J>IAXD5J:CVE-2024-21210</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>26</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionpack/issues/IAXNMV>IAXNMV:CVE-2024-41128</a></td><td>rubygem-actionpack</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>27</td><td><a href= https://gitee.com/src-openeuler/openssl/issues/IAXNM5>IAXNM5:CVE-2024-9143</a></td><td>openssl</td><td>待办的</td><td>4.3</td><td>0.9.6m,0.9.7d,0.9.7l,0.9.7n,0.9.8f,0.9.8g,0.9.8zi,1.0.0u,1.0.1v,1.0.2v,1.1.0,1.1.1f,1.1.1k,1.1.1l,1.1.1m,1.1.1wa,3.0.12,3.0.7,3.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>28</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionpack/issues/IAXNP5>IAXNP5:CVE-2024-47887</a></td><td>rubygem-actionpack</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>29</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionmailer/issues/IAXNPD>IAXNPD:CVE-2024-47889</a></td><td>rubygem-actionmailer</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>30</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYPJZ>IAYPJZ:CVE-2024-47679</a></td><td>kernel</td><td>已完成</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>31</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR8P>IAYR8P:CVE-2024-49983</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>32</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR8W>IAYR8W:CVE-2024-49948</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>33</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR9U>IAYR9U:CVE-2024-49949</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>34</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBL>IAYRBL:CVE-2024-50006</a></td><td>kernel</td><td>已完成</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>35</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBG>IAYRBG:CVE-2024-50013</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>36</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBQ>IAYRBQ:CVE-2024-50014</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>37</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRCB>IAYRCB:CVE-2024-49967</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>38</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRCE>IAYRCE:CVE-2024-49878</a></td><td>kernel</td><td>已完成</td><td>3.9</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>39</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRD8>IAYRD8:CVE-2024-49960</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>40</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB0ENF>IB0ENF:CVE-2024-50082</a></td><td>kernel</td><td>待办的</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>41</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB0EQM>IB0EQM:CVE-2024-50073</a></td><td>kernel</td><td>待办的</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>42</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BWS>IB2BWS:CVE-2024-50133</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>43</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BX7>IB2BX7:CVE-2024-50099</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>44</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BVE>IB2BVE:CVE-2024-50095</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>45</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BWY>IB2BWY:CVE-2024-50131</a></td><td>kernel</td><td>待办的</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>46</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2STS>IB2STS:CVE-2024-50154</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>47</td><td><a href= https://gitee.com/src-openeuler/xstream/issues/IB2UAN>IB2UAN:CVE-2024-47072</a></td><td>xstream</td><td>已完成</td><td>7.5</td><td>1.4.11.1,1.4.18,1.4.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>48</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2SWP>IB2SWP:CVE-2024-50142</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>49</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2YUI>IB2YUI:CVE-2024-50184</a></td><td>kernel</td><td>待办的</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr></table><h3>(2) bugfix</h3><p>修复bugfix 16个</p><table><tr bgcolor="#FFCA28" align="center"><td><b>序号</b></td><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>1</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB0B2R>#IB0B2R:network_mgmt: Change print_ip_notify_pkt_en sysfs_attr priority</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>2</td><td><a href= https://gitee.com/src-openeuler/sysSentry/issues/IB3PAR>#IB3PAR:sysSentry-22.03-LTS-SP4 update版本增加hbm_online_repair插件能力</a></td><td>sysSentry</td><td>待办的</td></tr><tr bgcolor="#FFFFFF" align="center"><td>3</td><td><a href= https://gitee.com/openeuler/kernel/issues/I8TAPW>#I8TAPW:【OLK-6.6】Support SMT control on arm64</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>4</td><td><a href= https://gitee.com/openeuler/kernel/issues/IA7HMV>#IA7HMV:【hulk-5.10-欧拉OS】【kernel test】BUG: KASAN: use-after-free in cgroup_path_ns</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>5</td><td><a href= https://gitee.com/src-openeuler/kpatch/issues/IB2JYM>#IB2JYM:【22.03-LTS-SP4】arm版本热补丁制作失败</a></td><td>kpatch</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>6</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB0OV7>#IB0OV7:【OLK-5.10】【可靠性】支持更多场景的可靠性容错</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>7</td><td><a href= https://gitee.com/openeuler/kernel/issues/IATZPG>#IATZPG:BUG: KASAN: slab-use-after-free in rpc_wake_up_queued_task</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>8</td><td><a href= https://gitee.com/src-openeuler/gala-anteater/issues/IB36SM>#IB36SM:去除冗余代码</a></td><td>gala-anteater</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>9</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB1WB9>#IB1WB9:【OLK-5.10】Support SMT control on arm64</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>10</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2EW4>#IB2EW4:主线补丁回合:bpf, net: Fix a potential race in do_sock_getsockopt()</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>11</td><td><a href= https://gitee.com/src-openeuler/mosquitto/issues/IB3LZ2>#IB3LZ2:mosquitto_dynamic_security 实际上是一个插件,被错误打包进了 devel 开发包</a></td><td>mosquitto</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>12</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2LVJ>#IB2LVJ:Update ASPM sysfs on MFD function removal to avoid use-after-free</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>13</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB3N2A>#IB3N2A:[openEuler-1.0-LTS][OLK-5.10][OLK-6.6]sched: smart_grid: Prevent double-free in sched_grid_qos_free</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>14</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2DWH>#IB2DWH:[OLK-5.10]RDMA/hns: Fix DCA mmap area PUAF</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>15</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB27BV>#IB27BV:SDMA-DAE增加通道ida校验</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>16</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB20ED>#IB20ED:nfs并发打开关闭不同文件时强制卸载文件系统触发UAF</a></td><td>kernel</td><td>已完成</td></tr></table><h3>(3) requires</h3><table><tr bgcolor="#FFCA28" align="center"><td><b>仓库</b></td><td><b>引入原因</b></td></tr></table><h2>2.测试repo源</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>repo_type</b></td><td><b>url</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>standard</td><td>https://dailybuild.openeuler.openatom.cn/repo.openeuler.org/openEuler-22.03-LTS-SP4/update_20241113/</td></tr><tr bgcolor="#FFFFFF" align="center"><td>epol</td><td>https://dailybuild.openeuler.openatom.cn/repo.openeuler.org/openEuler-22.03-LTS-SP4/EPOL/update_20241113/main/</td></tr></table><h2>3.安装、自编译问题</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td></tr></table><h2>4.遗留问题</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td><td><b>type</b></td></tr></table>
版本目标: CVE、软件包引入升级和Bugfix修复<br/>版本: openEuler-22.03-LTS-SP4<br/>例行CVE冻结: 2024-11-13 12:00:00<br/>代码冻结: 2024-11-13 12:00:00<br/><br/>版本发布负责人<br/>版本经理:@randy1568 @yajieli<br/>开发人员:@lyn1001 @jxy_git @sun_hai_10<br/>安全委员会:@zhujianwei001 @luoyukai<br/>测试人员:@Algernon @li-yancheng @wenjunryou<br/><h2>1.发布范围</h2><h3>(1) cve</h3><p>修复CVE 49个</p><table><tr bgcolor="#FFCA28" align="center"><td><b>序号</b></td><td><b>CVE</b></td><td><b>仓库</b></td><td><b>status</b></td><td><b>score</b></td><td><b>version</b></td><td><b>abi是否变化</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>1</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I577EZ>I577EZ:CVE-2022-25762</a></td><td>tomcat</td><td>已完成</td><td>8.6</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>2</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I5TQD3>I5TQD3:CVE-2021-43980</a></td><td>tomcat</td><td>已完成</td><td>3.7</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>3</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I89671>I89671:CVE-2023-44487</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>4</td><td><a href= https://gitee.com/src-openeuler/sbt/issues/I8AB2L>I8AB2L:CVE-2023-46122</a></td><td>sbt</td><td>已完成</td><td>7.1</td><td>0.13.1</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>5</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I8K8Y7>I8K8Y7:CVE-2023-46589</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>6</td><td><a href= https://gitee.com/src-openeuler/woodstox-core/issues/I9AY1I>I9AY1I:CVE-2022-40152</a></td><td>woodstox-core</td><td>已完成</td><td>7.5</td><td>5.0.3,6.2.8</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>7</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I98BWJ>I98BWJ:CVE-2024-23672</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>8</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/I98BXD>I98BXD:CVE-2024-24549</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>9</td><td><a href= https://gitee.com/src-openeuler/netty3/issues/I9BJ9R>I9BJ9R:CVE-2024-29025</a></td><td>netty3</td><td>已完成</td><td>5.3</td><td>3.10.6</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>10</td><td><a href= https://gitee.com/src-openeuler/netty/issues/I9BJ9S>I9BJ9S:CVE-2024-29025</a></td><td>netty</td><td>已完成</td><td>5.3</td><td>3.6.2.Final,4.1.13</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>11</td><td><a href= https://gitee.com/src-openeuler/undertow/issues/I9E578>I9E578:CVE-2023-1973</a></td><td>undertow</td><td>已完成</td><td>7.5</td><td>1.4.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>12</td><td><a href= https://gitee.com/src-openeuler/hdf5/issues/I9OLDK>I9OLDK:CVE-2024-29166</a></td><td>hdf5</td><td>已完成</td><td>5.7</td><td>1.10.8,1.12.1,1.8.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>13</td><td><a href= https://gitee.com/src-openeuler/hdf5/issues/I9OLE5>I9OLE5:CVE-2024-32606</a></td><td>hdf5</td><td>已完成</td><td>5.7</td><td>1.10.8,1.12.1,1.8.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>14</td><td><a href= https://gitee.com/src-openeuler/tomcat/issues/IAAFZP>IAAFZP:CVE-2024-34750</a></td><td>tomcat</td><td>已完成</td><td>7.5</td><td>9.0.10</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>15</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAR49K>IAR49K:CVE-2024-46685</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>16</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAR5FZ>IAR5FZ:CVE-2024-46702</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>17</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAUA64>IAUA64:CVE-2024-46815</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>18</td><td><a href= https://gitee.com/src-openeuler/dhcp/issues/IAUAUD>IAUAUD:CVE-2024-1975</a></td><td>dhcp</td><td>已完成</td><td>7.5</td><td>4.4.2,4.4.3</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>19</td><td><a href= https://gitee.com/src-openeuler/dhcp/issues/IAUAVG>IAUAVG:CVE-2024-1737</a></td><td>dhcp</td><td>已完成</td><td>7.5</td><td>4.4.2,4.4.3</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>20</td><td><a href= https://gitee.com/src-openeuler/mosquitto/issues/IAWFLX>IAWFLX:CVE-2024-8376</a></td><td>mosquitto</td><td>已完成</td><td>8.3</td><td>1.6.15,2.0.15,2.0.16</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>21</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD4Y>IAXD4Y:CVE-2024-21211</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.382.b05,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>22</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD51>IAXD51:CVE-2024-21217</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>23</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD4W>IAXD4W:CVE-2024-21208</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>24</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD5H>IAXD5H:CVE-2024-21235</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>4.8</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>25</td><td><a href= https://gitee.com/src-openeuler/openjdk-1.8.0/issues/IAXD5J>IAXD5J:CVE-2024-21210</a></td><td>openjdk-1.8.0</td><td>已完成</td><td>3.7</td><td>1.8.0.292.b10,1.8.0.302.b07,1.8.0.312.b07,1.8.0.322.b06,1.8.0.352.b07,1.8.0.352.b08,1.8.0.362.b09,1.8.0.372.b07,1.8.0.392.b08,1.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>26</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionpack/issues/IAXNMV>IAXNMV:CVE-2024-41128</a></td><td>rubygem-actionpack</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>27</td><td><a href= https://gitee.com/src-openeuler/openssl/issues/IAXNM5>IAXNM5:CVE-2024-9143</a></td><td>openssl</td><td>待办的</td><td>4.3</td><td>0.9.6m,0.9.7d,0.9.7l,0.9.7n,0.9.8f,0.9.8g,0.9.8zi,1.0.0u,1.0.1v,1.0.2v,1.1.0,1.1.1f,1.1.1k,1.1.1l,1.1.1m,1.1.1wa,3.0.12,3.0.7,3.</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>28</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionpack/issues/IAXNP5>IAXNP5:CVE-2024-47887</a></td><td>rubygem-actionpack</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>29</td><td><a href= https://gitee.com/src-openeuler/rubygem-actionmailer/issues/IAXNPD>IAXNPD:CVE-2024-47889</a></td><td>rubygem-actionmailer</td><td>已完成</td><td>3.7</td><td>5.2.3,5.2.4.4,6.1.4.1,7.0.4,7.0.7</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>30</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYPJZ>IAYPJZ:CVE-2024-47679</a></td><td>kernel</td><td>已完成</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>31</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR8P>IAYR8P:CVE-2024-49983</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>32</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR8W>IAYR8W:CVE-2024-49948</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>33</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYR9U>IAYR9U:CVE-2024-49949</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>34</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBL>IAYRBL:CVE-2024-50006</a></td><td>kernel</td><td>已完成</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>35</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBG>IAYRBG:CVE-2024-50013</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>36</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRBQ>IAYRBQ:CVE-2024-50014</a></td><td>kernel</td><td>已完成</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>37</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRCB>IAYRCB:CVE-2024-49967</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>38</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRCE>IAYRCE:CVE-2024-49878</a></td><td>kernel</td><td>已完成</td><td>3.9</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>39</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IAYRD8>IAYRD8:CVE-2024-49960</a></td><td>kernel</td><td>已完成</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>40</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB0ENF>IB0ENF:CVE-2024-50082</a></td><td>kernel</td><td>待办的</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>41</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB0EQM>IB0EQM:CVE-2024-50073</a></td><td>kernel</td><td>待办的</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>42</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BWS>IB2BWS:CVE-2024-50133</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>43</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BX7>IB2BX7:CVE-2024-50099</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>44</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BVE>IB2BVE:CVE-2024-50095</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>45</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2BWY>IB2BWY:CVE-2024-50131</a></td><td>kernel</td><td>待办的</td><td>7.8</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>46</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2STS>IB2STS:CVE-2024-50154</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>47</td><td><a href= https://gitee.com/src-openeuler/xstream/issues/IB2UAN>IB2UAN:CVE-2024-47072</a></td><td>xstream</td><td>已完成</td><td>7.5</td><td>1.4.11.1,1.4.18,1.4.20</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>48</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2SWP>IB2SWP:CVE-2024-50142</a></td><td>kernel</td><td>待办的</td><td>5.5</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr><tr bgcolor="#FFFFFF" align="center"><td>49</td><td><a href= https://gitee.com/src-openeuler/kernel/issues/IB2YUI>IB2YUI:CVE-2024-50184</a></td><td>kernel</td><td>待办的</td><td>4.7</td><td>4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0</td><td>否</td></tr></table><h3>(2) bugfix</h3><p>修复bugfix 16个</p><table><tr bgcolor="#FFCA28" align="center"><td><b>序号</b></td><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>1</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB0B2R>#IB0B2R:network_mgmt: Change print_ip_notify_pkt_en sysfs_attr priority</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>2</td><td><a href= https://gitee.com/src-openeuler/sysSentry/issues/IB3PAR>#IB3PAR:sysSentry-22.03-LTS-SP4 update版本增加hbm_online_repair插件能力</a></td><td>sysSentry</td><td>待办的</td></tr><tr bgcolor="#FFFFFF" align="center"><td>3</td><td><a href= https://gitee.com/openeuler/kernel/issues/I8TAPW>#I8TAPW:【OLK-6.6】Support SMT control on arm64</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>4</td><td><a href= https://gitee.com/openeuler/kernel/issues/IA7HMV>#IA7HMV:【hulk-5.10-欧拉OS】【kernel test】BUG: KASAN: use-after-free in cgroup_path_ns</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>5</td><td><a href= https://gitee.com/src-openeuler/kpatch/issues/IB2JYM>#IB2JYM:【22.03-LTS-SP4】arm版本热补丁制作失败</a></td><td>kpatch</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>6</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB0OV7>#IB0OV7:【OLK-5.10】【可靠性】支持更多场景的可靠性容错</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>7</td><td><a href= https://gitee.com/openeuler/kernel/issues/IATZPG>#IATZPG:BUG: KASAN: slab-use-after-free in rpc_wake_up_queued_task</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>8</td><td><a href= https://gitee.com/src-openeuler/gala-anteater/issues/IB36SM>#IB36SM:去除冗余代码</a></td><td>gala-anteater</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>9</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB1WB9>#IB1WB9:【OLK-5.10】Support SMT control on arm64</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>10</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2EW4>#IB2EW4:主线补丁回合:bpf, net: Fix a potential race in do_sock_getsockopt()</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>11</td><td><a href= https://gitee.com/src-openeuler/mosquitto/issues/IB3LZ2>#IB3LZ2:mosquitto_dynamic_security 实际上是一个插件,被错误打包进了 devel 开发包</a></td><td>mosquitto</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>12</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2LVJ>#IB2LVJ:Update ASPM sysfs on MFD function removal to avoid use-after-free</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>13</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB3N2A>#IB3N2A:[openEuler-1.0-LTS][OLK-5.10][OLK-6.6]sched: smart_grid: Prevent double-free in sched_grid_qos_free</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>14</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB2DWH>#IB2DWH:[OLK-5.10]RDMA/hns: Fix DCA mmap area PUAF</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>15</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB27BV>#IB27BV:SDMA-DAE增加通道ida校验</a></td><td>kernel</td><td>已完成</td></tr><tr bgcolor="#FFFFFF" align="center"><td>16</td><td><a href= https://gitee.com/openeuler/kernel/issues/IB20ED>#IB20ED:nfs并发打开关闭不同文件时强制卸载文件系统触发UAF</a></td><td>kernel</td><td>已完成</td></tr></table><h3>(3) requires</h3><table><tr bgcolor="#FFCA28" align="center"><td><b>仓库</b></td><td><b>引入原因</b></td></tr></table><h2>2.测试repo源</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>repo_type</b></td><td><b>url</b></td></tr><tr bgcolor="#FFFFFF" align="center"><td>standard</td><td>https://dailybuild.openeuler.openatom.cn/repo.openeuler.org/openEuler-22.03-LTS-SP4/update_20241113/</td></tr><tr bgcolor="#FFFFFF" align="center"><td>epol</td><td>https://dailybuild.openeuler.openatom.cn/repo.openeuler.org/openEuler-22.03-LTS-SP4/EPOL/update_20241113/main/</td></tr></table><h2>3.安装、自编译问题</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td></tr></table><h2>4.遗留问题</h2><table><tr bgcolor="#FFCA28" align="center"><td><b>issue</b></td><td><b>仓库</b></td><td><b>status</b></td><td><b>type</b></td></tr></table>
Comments (
7
)
Sign in
to comment
Status
Done
Backlog
Doing
Done
Declined
Assignees
Not set
Labels
sig/sig-release-mana
Not set
Projects
Unprojected
Unprojected
Milestones
No related milestones
No related milestones
Pull Requests
None yet
None yet
Successfully merging a pull request will close this issue.
Branches
No related branch
Branches (
-
)
Tags (
-
)
Planed to start   -   Planed to end
-
Top level
Not Top
Top Level: High
Top Level: Medium
Top Level: Low
Priority
Not specified
Serious
Main
Secondary
Unimportant
Duration
(hours)
参与者(7)
1
https://gitee.com/openeuler/release-management.git
git@gitee.com:openeuler/release-management.git
openeuler
release-management
release-management
Going to Help Center
Search
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
Comment
Repository Report
Back to the top
Login prompt
This operation requires login to the code cloud account. Please log in before operating.
Go to login
No account. Register