100 Star 60 Fork 241

src-openEuler / kernel

 / 详情

CVE-2022-1199

已完成
CVE和安全问题
创建于  
2022-04-21 14:49

一、漏洞信息
漏洞编号:CVE-2022-1199
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0
CVSS V3.0分值:
BaseScore:5.1 Medium
Vector:CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
漏洞公开时间:2022-08-29 23:15:00
漏洞创建时间:2022-04-21 14:49:39
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-1199

更多参考(点击展开)
参考来源 参考链接 来源链接
nvd https://www.openwall.com/lists/oss-security/2022/04/02/5
nvd https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
nvd https://bugzilla.redhat.com/show_bug.cgi?id=2070694
nvd https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
nvd https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
nvd https://access.redhat.com/security/cve/CVE-2022-1199
nvd https://security.netapp.com/advisory/ntap-20221228-0006/
redhat https://access.redhat.com/security/cve/CVE-2022-1199
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2070694 https://bugzilla.suse.com/show_bug.cgi?id=1198028
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1199 https://bugzilla.suse.com/show_bug.cgi?id=1198028
suse_bugzilla https://seclists.org/oss-sec/2022/q2/4 https://bugzilla.suse.com/show_bug.cgi?id=1198028
redhat_bugzilla https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 https://bugzilla.redhat.com/show_bug.cgi?id=2070694
redhat_bugzilla https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac https://bugzilla.redhat.com/show_bug.cgi?id=2070694
redhat_bugzilla https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10 https://bugzilla.redhat.com/show_bug.cgi?id=2070694
redhat_bugzilla https://www.openwall.com/lists/oss-security/2022/04/02/5 https://bugzilla.redhat.com/show_bug.cgi?id=2070694
ubuntu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://marc.info/?l=oss-security&m=164888973827435 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5469-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5514-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5515-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5539-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5541-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://ubuntu.com/security/notices/USN-5650-1 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2022-1199 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://launchpad.net/bugs/cve/CVE-2022-1199 https://ubuntu.com/security/CVE-2022-1199
ubuntu https://security-tracker.debian.org/tracker/CVE-2022-1199 https://ubuntu.com/security/CVE-2022-1199
debian https://security-tracker.debian.org/tracker/CVE-2022-1199
anolis https://anas.openanolis.cn/cves/detail/CVE-2022-1199
cve_search https://www.openwall.com/lists/oss-security/2022/04/02/5
cve_search https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
cve_search https://bugzilla.redhat.com/show_bug.cgi?id=2070694
cve_search https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
cve_search https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
cve_search https://access.redhat.com/security/cve/CVE-2022-1199
cve_search https://security.netapp.com/advisory/ntap-20221228-0006/
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-0494.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-0742.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-0854.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-1015.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-1016.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-1199.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-24958.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-25636.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-27223.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-29156.html https://alas.aws.amazon.com/AL2022/ALAS-2022-042.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2257.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2264.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2284.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2285.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2286.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2287.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2288.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2289.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2304.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2343.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2344.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2345.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2816.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2817.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2819.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-3037.html https://alas.aws.amazon.com/ALAS-2022-1639.html
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2070694
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1199
suse_bugzilla https://seclists.org/oss-sec/2022/q2/4
redhat_bugzilla https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
redhat_bugzilla https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
redhat_bugzilla https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
redhat_bugzilla https://www.openwall.com/lists/oss-security/2022/04/02/5
redhat_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2070694
ubuntu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
ubuntu https://marc.info/?l=oss-security&m=164888973827435
ubuntu https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
ubuntu https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
ubuntu https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
ubuntu https://ubuntu.com/security/notices/USN-5469-1
ubuntu https://ubuntu.com/security/notices/USN-5514-1
ubuntu https://ubuntu.com/security/notices/USN-5515-1
ubuntu https://ubuntu.com/security/notices/USN-5539-1
ubuntu https://ubuntu.com/security/notices/USN-5541-1
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2022-1199
ubuntu https://launchpad.net/bugs/cve/CVE-2022-1199
ubuntu https://security-tracker.debian.org/tracker/CVE-2022-1199
debian https://security-tracker.debian.org/tracker/CVE-2022-1199
anolis https://anas.openanolis.cn/cves/detail/CVE-2022-1199
nvd https://www.openwall.com/lists/oss-security/2022/04/02/5
nvd https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
nvd https://bugzilla.redhat.com/show_bug.cgi?id=2070694
nvd https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
nvd https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
nvd https://access.redhat.com/security/cve/CVE-2022-1199

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 nvd
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10 nvd
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac nvd
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 redhat_bugzilla
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac redhat_bugzilla
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10 redhat_bugzilla
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 ubuntu
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10 ubuntu
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac ubuntu
linux_kernel 4.14.272 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=d03aba820f1549c9f3b1d14bf48fa082663d22b5 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 4.19.235 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=5ab8de9377edde3eaf1de9872e2f01d43157cd6c https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 4.9.307 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=cad71f1094834eb69f7ceec8100d300c26b43053 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.10.106 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2201ef32f933944ee02e59205adb566bafcdf91 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.15.29 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=46ad629e58ce3a88c924ff3c5a7e9129b0df5659 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.16.15 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1d83a95214bc516bd8778fa423cb8383d925f8c8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.4.185 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0a64aea5fe023cf1e4973676b11f49038b1f045b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 4.14.272 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=d03aba820f1549c9f3b1d14bf48fa082663d22b5 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 4.19.235 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=5ab8de9377edde3eaf1de9872e2f01d43157cd6c https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 4.9.307 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=cad71f1094834eb69f7ceec8100d300c26b43053 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.10.106 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2201ef32f933944ee02e59205adb566bafcdf91 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.15.29 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=46ad629e58ce3a88c924ff3c5a7e9129b0df5659 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.16.15 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1d83a95214bc516bd8778fa423cb8383d925f8c8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves
linux_kernel 5.4.185 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0a64aea5fe023cf1e4973676b11f49038b1f045b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 linuxkernelcves

二、漏洞分析结构反馈
影响性分析说明:

此漏洞可被利用导致拒绝服务

openEuler评分:
5.1
Vector:CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-22.03-LTS:受影响
2.openEuler-20.03-LTS-SP1(4.19.90):受影响
3.openEuler-20.03-LTS-SP2(4.19.90):受影响
4.openEuler-20.03-LTS-SP3(4.19.90):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS(4.19.90):否
2.openEuler-20.03-LTS-SP1(4.19.90):否
3.openEuler-20.03-LTS-SP2(4.19.90):否
4.openEuler-20.03-LTS-SP3(4.19.90):否

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2022-1631

评论 (8)

shaozhengchao 创建了任务

Hi shaozhengchao, welcome to the openEuler Community.
I'm the Bot here serving you. You can find the instructions on how to interact with me at Here.
If you have any questions, please contact the SIG: Kernel, and any of the maintainers: @Xie XiuQi , @YangYingliang , @成坚 (CHENG Jian) , @pi3orama , @jiaoff

openeuler-ci-bot 添加了
 
sig/Kernel
标签
openeuler-ci-bot 修改了描述
openeuler-ci-bot 负责人设置为Xie XiuQi
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签

@Xie XiuQi ,@YangYingliang ,@成坚 (CHENG Jian) ,@pi3orama ,@jiaoff
issue处理注意事项:
1. 当前issue受影响的分支提交pr时, 须在pr描述中填写当前issue编号进行关联, 否则无法关闭当前issue;
2. 模板内容需要填写完整, 无论是受影响或者不受影响都需要填写完整内容,未引入的分支不需要填写, 否则无法关闭当前issue;
3. 以下为模板中需要填写完整的内容, 请复制到评论区回复, 注: 内容的标题名称(影响性分析说明, openEuler评分, 受影响版本排查(受影响/不受影响), 修复是否涉及abi变化(是/否))不能省略,省略后cve-manager将无法正常解析填写内容.


影响性分析说明:

openEuler评分: (评分和向量)

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(4.19.90):
2.openEuler-20.03-LTS-SP2(4.19.90):
3.openEuler-20.03-LTS-SP3(4.19.194):
4.openEuler-22.03-LTS(5.10.0):

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(4.19.90):
2.openEuler-20.03-LTS-SP2(4.19.90):
3.openEuler-20.03-LTS-SP3(4.19.194):
4.openEuler-22.03-LTS(5.10.0):


issue处理具体操作请参考:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
pr关联issue具体操作请参考:
https://gitee.com/help/articles/4142

@shaozhengchao CVE信息从NVD同步失败, 请稍后重试, 或者数据源不存在.

漏洞总共包含三个问题:
第一个问题:
1、代码中可以同时down和release设备,在down流程中会释放ax25_list_lock锁,然后获取sk的spin lock锁,此时就会出现竞争条件,当B线程先执行到ax25->sk=NULL,A线程再执行lock_sock(s->sk);或release_sock(s->sk);  此时就会出现访问空指针问题
2、代码中可以同时down和release设备,在down流程中会释放ax25_list_lock锁,然后获取sk的spin lock锁,此时就会出现竞争条件,当B线程先执行到sock_put(sk)去释放sk,A线程再执行lock_sock(s->sk);或release_sock(s->sk);  此时就会出现UAF问题
第二个问题:
代码中可以同时down和release设备,在down流程中会释放sk的spin lock锁,然后再disconnet设备,同时release流程在down流程释放锁后可以获取到sk的spin lock锁,此时就会出现竞争条件,当B线程先执行到ax25->sk = NULL,A线程再执行bh_lock_sock(ax25->sk)或bh_unlock_sock(ax25->sk),此时就会访问到空指针。
第三个问题:
AX25设备接收方在接收到消息的时候,会调用ax25_create_cb去创建ax25_cb,此时ax25_cb->sk为NULL,此时如果设备解绑或者down,那就会调用sock_hold(sk),此时就会造成空指针访问。

@成坚 (CHENG Jian) ,@Xie XiuQi ,@YangYingliang ,@pi3orama ,@jiaoff ,@zhengzengkai
关闭issue前,需要将受影响的分支在合并pr时关联上当前issue编号: #I53VJO:CVE-2022-1199
受影响分支: openEuler-20.03-LTS-SP1/openEuler-20.03-LTS-SP2/openEuler-20.03-LTS-SP3
具体操作参考: https://gitee.com/help/articles/4142

openeuler-ci-bot 修改了描述
openeuler-ci-bot 任务状态已完成 修改为待办的
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签
zhengzengkai 通过src-openeuler/kernel Pull Request !608任务状态待办的 修改为已完成

@成坚 (CHENG Jian) ,@Xie XiuQi ,@YangYingliang ,@pi3orama ,@jiaoff ,@zhengzengkai
关闭issue前,需要将受影响的分支在合并pr时关联上当前issue编号: #I53VJO:CVE-2022-1199
受影响分支: openEuler-20.03-LTS-SP1/openEuler-20.03-LTS-SP2/openEuler-20.03-LTS-SP3
具体操作参考: https://gitee.com/help/articles/4142

openeuler-ci-bot 任务状态已完成 修改为待办的
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签
Qiuuuuu 通过src-openeuler/kernel Pull Request !609任务状态待办的 修改为已完成

@成坚 (CHENG Jian) ,@Xie XiuQi ,@YangYingliang ,@pi3orama ,@jiaoff ,@Qiuuuuu
关闭issue前,需要将受影响的分支在合并pr时关联上当前issue编号: #I53VJO:CVE-2022-1199
受影响分支: openEuler-20.03-LTS-SP2/openEuler-20.03-LTS-SP3
具体操作参考: https://gitee.com/help/articles/4142

openeuler-ci-bot 任务状态已完成 修改为待办的
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签
Qiuuuuu 通过src-openeuler/kernel Pull Request !611任务状态待办的 修改为已完成

@成坚 (CHENG Jian) ,@Xie XiuQi ,@YangYingliang ,@pi3orama ,@jiaoff ,@Qiuuuuu
关闭issue前,需要将受影响的分支在合并pr时关联上当前issue编号: #I53VJO:CVE-2022-1199
受影响分支: openEuler-20.03-LTS-SP2
具体操作参考: https://gitee.com/help/articles/4142

openeuler-ci-bot 任务状态已完成 修改为待办的
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签
Qiuuuuu 通过src-openeuler/kernel Pull Request !610任务状态待办的 修改为已完成
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 添加了
 
CVE/FIXED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签
yanxiaobing2020 任务类型任务 修改为CVE和安全问题
openeuler-ci-bot 修改了描述
openeuler-ci-bot 修改了描述
openeuler-ci-bot 移除了
 
CVE/FIXED
标签
openeuler-ci-bot 移除了
 
sig/Kernel
标签
openeuler-ci-bot 添加了
 
CVE/UNAFFECTED
标签
openeuler-ci-bot 添加了
 
sig/Kernel
标签

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(2)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

搜索帮助

344bd9b3 5694891 D2dac590 5694891