Sign in
Sign up
Explore
Enterprise
Education
Search
Help
Terms of use
About Us
Explore
Enterprise
Education
Gitee Premium
Gitee AI
AI teammates
Sign in
Sign up
Fetch the repository succeeded.
description of repo status
Open Source
>
Other
>
Operation System
&&
Donate
Please sign in before you donate.
Cancel
Sign in
Scan WeChat QR to Pay
Cancel
Complete
Prompt
Switch to Alipay.
OK
Cancel
Watch
Unwatch
Watching
Releases Only
Ignoring
128
Star
73
Fork
329
src-openEuler
/
kernel
Closed
Code
Issues
1197
Pull Requests
35
Wiki
Insights
Pipelines
Service
JavaDoc
PHPDoc
Quality Analysis
Jenkins for Gitee
Tencent CloudBase
Tencent Cloud Serverless
悬镜安全
Aliyun SAE
Codeblitz
SBOM
DevLens
Don’t show this again
Update failed. Please try again later!
Remove this flag
Content Risk Flag
This task is identified by
as the content contains sensitive information such as code security bugs, privacy leaks, etc., so it is only accessible to contributors of this repository.
CVE-2023-53215
Done
#ICY4I1
CVE和安全问题
openeuler-ci-bot
owner
Opened this issue
2025-09-16 00:11
一、漏洞信息 漏洞编号:[CVE-2023-53215](https://nvd.nist.gov/vuln/detail/CVE-2023-53215) 漏洞归属组件:[kernel](https://gitee.com/src-openeuler/kernel) 漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.4.0,6.6.0 CVSS V3.0分值: BaseScore:N/A None Vector:CVSS:3.0/ 漏洞简述: In the Linux kernel, the following vulnerability has been resolved:sched/fair: Don t balance task to its current running CPUWe ve run into the case that the balancer tries to balance a migrationdisabled task and trigger the warning in set_task_cpu() like below: ------------[ cut here ]------------ WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240 Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip> CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G O 6.1.0-rc4+ #1 Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021 pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_task_cpu+0x188/0x240 lr : load_balance+0x5d0/0xc60 sp : ffff80000803bc70 x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040 x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001 x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78 x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000 x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530 x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001 Call trace: set_task_cpu+0x188/0x240 load_balance+0x5d0/0xc60 rebalance_domains+0x26c/0x380 _nohz_idle_balance.isra.0+0x1e0/0x370 run_rebalance_domains+0x6c/0x80 __do_softirq+0x128/0x3d8 ____do_softirq+0x18/0x24 call_on_irq_stack+0x2c/0x38 do_softirq_own_stack+0x24/0x3c __irq_exit_rcu+0xcc/0xf4 irq_exit_rcu+0x18/0x24 el1_interrupt+0x4c/0xe4 el1h_64_irq_handler+0x18/0x2c el1h_64_irq+0x74/0x78 arch_cpu_idle+0x18/0x4c default_idle_call+0x58/0x194 do_idle+0x244/0x2b0 cpu_startup_entry+0x30/0x3c secondary_start_kernel+0x14c/0x190 __secondary_switched+0xb0/0xb4 ---[ end trace 0000000000000000 ]---Further investigation shows that the warning is superfluous, the migrationdisabled task is just going to be migrated to its current running CPU.This is because that on load balance if the dst_cpu is not allowed by thetask, we ll re-select a new_dst_cpu as a candidate. If no task can bebalanced to dst_cpu we ll try to balance the task to the new_dst_cpuinstead. In this case when the migration disabled task is not on CPU itonly allows to run on its current CPU, load balance will select itscurrent CPU as new_dst_cpu and later triggers the warning above.The new_dst_cpu is chosen from the env->dst_grpmask. Currently itcontains CPUs in sched_group_span() and if we have overlapped groups it spossible to run into this case. This patch makes env->dst_grpmask ofgroup_balance_mask() which exclude any CPUs from the busiest group andsolve the issue. For balancing in a domain with no overlapped groupsthe behaviour keeps same as before. 漏洞公开时间:2025-09-15 23:15:48 漏洞创建时间:2025-09-16 00:11:32 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2023-53215 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/T/#u | | | | https://security-tracker.debian.org/tracker/CVE-2023-53215 | | | | https://www.cve.org/CVERecord?id=CVE-2023-53215 | | | | https://nvd.nist.gov/vuln/detail/CVE-2023-53215 | | | | https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/T | | | | https://bugzilla.redhat.com/show_bug.cgi?id=2395368 | | | | https://docs.bell-sw.com/security/cves/CVE-2023-53215 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: 七彩瞬析开源风险感知平台 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | gregkh/linux | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | ljqc | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | cvelistv5 | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | cvelistv5 | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | cvelistv5 | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | cvelistv5 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | cvelistv5 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | cvelistv5 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | cvelistv5 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | cvelistv5 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | snyk | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | snyk | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | snyk | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | snyk | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | snyk | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | snyk | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | snyk | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | snyk | </details> 二、漏洞分析结构反馈 影响性分析说明: In the Linux kernel, the following vulnerability has been resolved:sched/fair: Don t balance task to its current running CPUWe ve run into the case that the balancer tries to balance a migrationdisabled task and trigger the warning in set_task_cpu() like below: ------------[ cut here ]------------ WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240 Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip> CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G O 6.1.0-rc4+ #1 Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021 pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_task_cpu+0x188/0x240 lr : load_balance+0x5d0/0xc60 sp : ffff80000803bc70 x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040 x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001 x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78 x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000 x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530 x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001 Call trace: set_task_cpu+0x188/0x240 load_balance+0x5d0/0xc60 rebalance_domains+0x26c/0x380 _nohz_idle_balance.isra.0+0x1e0/0x370 run_rebalance_domains+0x6c/0x80 __do_softirq+0x128/0x3d8 ____do_softirq+0x18/0x24 call_on_irq_stack+0x2c/0x38 do_softirq_own_stack+0x24/0x3c __irq_exit_rcu+0xcc/0xf4 irq_exit_rcu+0x18/0x24 el1_interrupt+0x4c/0xe4 el1h_64_irq_handler+0x18/0x2c el1h_64_irq+0x74/0x78 arch_cpu_idle+0x18/0x4c default_idle_call+0x58/0x194 do_idle+0x244/0x2b0 cpu_startup_entry+0x30/0x3c secondary_start_kernel+0x14c/0x190 __secondary_switched+0xb0/0xb4 ---[ end trace 0000000000000000 ]---Further investigation shows that the warning is superfluous, the migrationdisabled task is just going to be migrated to its current running CPU.This is because that on load balance if the dst_cpu is not allowed by thetask, we ll re-select a new_dst_cpu as a candidate. If no task can bebalanced to dst_cpu we ll try to balance the task to the new_dst_cpuinstead. In this case when the migration disabled task is not on CPU itonly allows to run on its current CPU, load balance will select itscurrent CPU as new_dst_cpu and later triggers the warning above.The new_dst_cpu is chosen from the env->dst_grpmask. Currently itcontains CPUs in sched_group_span() and if we have overlapped groups it spossible to run into this case. This patch makes env->dst_grpmask ofgroup_balance_mask() which exclude any CPUs from the busiest group andsolve the issue. For balancing in a domain with no overlapped groupsthe behaviour keeps same as before.The Linux kernel CVE team has assigned CVE-2023-53215 to this issue. openEuler评分: 5.5 Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.openEuler-20.03-LTS-SP4(4.19.90):受影响 2.master(6.12.33):不受影响 3.openEuler-22.03-LTS-SP3(5.10.0):不受影响 4.openEuler-22.03-LTS-SP4(5.10.0):不受影响 5.openEuler-24.03-LTS(6.6.0):不受影响 6.openEuler-24.03-LTS-Next(6.6.0):不受影响 7.openEuler-24.03-LTS-SP1(6.6.0):不受影响 8.openEuler-24.03-LTS-SP2(6.6.0):不受影响 修复是否涉及abi变化(是/否): 1.master(6.12.33):否 2.openEuler-20.03-LTS-SP4(4.19.90):否 3.openEuler-22.03-LTS-SP3(5.10.0):否 4.openEuler-22.03-LTS-SP4(5.10.0):否 5.openEuler-24.03-LTS(6.6.0):否 6.openEuler-24.03-LTS-Next(6.6.0):否 7.openEuler-24.03-LTS-SP1(6.6.0):否 8.openEuler-24.03-LTS-SP2(6.6.0):否 原因说明: 1.openEuler-20.03-LTS-SP4(4.19.90):正常修复 2.master(6.12.33):不受影响-漏洞代码不能被攻击者触发 3.openEuler-22.03-LTS-SP3(5.10.0):不受影响-漏洞代码不能被攻击者触发 4.openEuler-22.03-LTS-SP4(5.10.0):不受影响-漏洞代码不能被攻击者触发 5.openEuler-24.03-LTS(6.6.0):不受影响-漏洞代码不能被攻击者触发 6.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发 7.openEuler-24.03-LTS-SP1(6.6.0):不受影响-漏洞代码不能被攻击者触发 8.openEuler-24.03-LTS-SP2(6.6.0):不受影响-漏洞代码不能被攻击者触发 三、漏洞修复 安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-2406
一、漏洞信息 漏洞编号:[CVE-2023-53215](https://nvd.nist.gov/vuln/detail/CVE-2023-53215) 漏洞归属组件:[kernel](https://gitee.com/src-openeuler/kernel) 漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.4.0,6.6.0 CVSS V3.0分值: BaseScore:N/A None Vector:CVSS:3.0/ 漏洞简述: In the Linux kernel, the following vulnerability has been resolved:sched/fair: Don t balance task to its current running CPUWe ve run into the case that the balancer tries to balance a migrationdisabled task and trigger the warning in set_task_cpu() like below: ------------[ cut here ]------------ WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240 Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip> CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G O 6.1.0-rc4+ #1 Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021 pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_task_cpu+0x188/0x240 lr : load_balance+0x5d0/0xc60 sp : ffff80000803bc70 x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040 x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001 x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78 x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000 x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530 x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001 Call trace: set_task_cpu+0x188/0x240 load_balance+0x5d0/0xc60 rebalance_domains+0x26c/0x380 _nohz_idle_balance.isra.0+0x1e0/0x370 run_rebalance_domains+0x6c/0x80 __do_softirq+0x128/0x3d8 ____do_softirq+0x18/0x24 call_on_irq_stack+0x2c/0x38 do_softirq_own_stack+0x24/0x3c __irq_exit_rcu+0xcc/0xf4 irq_exit_rcu+0x18/0x24 el1_interrupt+0x4c/0xe4 el1h_64_irq_handler+0x18/0x2c el1h_64_irq+0x74/0x78 arch_cpu_idle+0x18/0x4c default_idle_call+0x58/0x194 do_idle+0x244/0x2b0 cpu_startup_entry+0x30/0x3c secondary_start_kernel+0x14c/0x190 __secondary_switched+0xb0/0xb4 ---[ end trace 0000000000000000 ]---Further investigation shows that the warning is superfluous, the migrationdisabled task is just going to be migrated to its current running CPU.This is because that on load balance if the dst_cpu is not allowed by thetask, we ll re-select a new_dst_cpu as a candidate. If no task can bebalanced to dst_cpu we ll try to balance the task to the new_dst_cpuinstead. In this case when the migration disabled task is not on CPU itonly allows to run on its current CPU, load balance will select itscurrent CPU as new_dst_cpu and later triggers the warning above.The new_dst_cpu is chosen from the env->dst_grpmask. Currently itcontains CPUs in sched_group_span() and if we have overlapped groups it spossible to run into this case. This patch makes env->dst_grpmask ofgroup_balance_mask() which exclude any CPUs from the busiest group andsolve the issue. For balancing in a domain with no overlapped groupsthe behaviour keeps same as before. 漏洞公开时间:2025-09-15 23:15:48 漏洞创建时间:2025-09-16 00:11:32 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2023-53215 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/T/#u | | | | https://security-tracker.debian.org/tracker/CVE-2023-53215 | | | | https://www.cve.org/CVERecord?id=CVE-2023-53215 | | | | https://nvd.nist.gov/vuln/detail/CVE-2023-53215 | | | | https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/T | | | | https://bugzilla.redhat.com/show_bug.cgi?id=2395368 | | | | https://docs.bell-sw.com/security/cves/CVE-2023-53215 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | | | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: 七彩瞬析开源风险感知平台 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | gregkh/linux | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | ljqc | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | cvelistv5 | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | cvelistv5 | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | cvelistv5 | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | cvelistv5 | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | cvelistv5 | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | cvelistv5 | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | cvelistv5 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | cvelistv5 | | | | https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de | | snyk | | | | https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54 | | snyk | | | | https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15 | | snyk | | | | https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd | | snyk | | | | https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68 | | snyk | | | | https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc | | snyk | | | | https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab | | snyk | | | | https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1 | | snyk | </details> 二、漏洞分析结构反馈 影响性分析说明: In the Linux kernel, the following vulnerability has been resolved:sched/fair: Don t balance task to its current running CPUWe ve run into the case that the balancer tries to balance a migrationdisabled task and trigger the warning in set_task_cpu() like below: ------------[ cut here ]------------ WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240 Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip> CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G O 6.1.0-rc4+ #1 Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021 pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_task_cpu+0x188/0x240 lr : load_balance+0x5d0/0xc60 sp : ffff80000803bc70 x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040 x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001 x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78 x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000 x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530 x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001 Call trace: set_task_cpu+0x188/0x240 load_balance+0x5d0/0xc60 rebalance_domains+0x26c/0x380 _nohz_idle_balance.isra.0+0x1e0/0x370 run_rebalance_domains+0x6c/0x80 __do_softirq+0x128/0x3d8 ____do_softirq+0x18/0x24 call_on_irq_stack+0x2c/0x38 do_softirq_own_stack+0x24/0x3c __irq_exit_rcu+0xcc/0xf4 irq_exit_rcu+0x18/0x24 el1_interrupt+0x4c/0xe4 el1h_64_irq_handler+0x18/0x2c el1h_64_irq+0x74/0x78 arch_cpu_idle+0x18/0x4c default_idle_call+0x58/0x194 do_idle+0x244/0x2b0 cpu_startup_entry+0x30/0x3c secondary_start_kernel+0x14c/0x190 __secondary_switched+0xb0/0xb4 ---[ end trace 0000000000000000 ]---Further investigation shows that the warning is superfluous, the migrationdisabled task is just going to be migrated to its current running CPU.This is because that on load balance if the dst_cpu is not allowed by thetask, we ll re-select a new_dst_cpu as a candidate. If no task can bebalanced to dst_cpu we ll try to balance the task to the new_dst_cpuinstead. In this case when the migration disabled task is not on CPU itonly allows to run on its current CPU, load balance will select itscurrent CPU as new_dst_cpu and later triggers the warning above.The new_dst_cpu is chosen from the env->dst_grpmask. Currently itcontains CPUs in sched_group_span() and if we have overlapped groups it spossible to run into this case. This patch makes env->dst_grpmask ofgroup_balance_mask() which exclude any CPUs from the busiest group andsolve the issue. For balancing in a domain with no overlapped groupsthe behaviour keeps same as before.The Linux kernel CVE team has assigned CVE-2023-53215 to this issue. openEuler评分: 5.5 Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.openEuler-20.03-LTS-SP4(4.19.90):受影响 2.master(6.12.33):不受影响 3.openEuler-22.03-LTS-SP3(5.10.0):不受影响 4.openEuler-22.03-LTS-SP4(5.10.0):不受影响 5.openEuler-24.03-LTS(6.6.0):不受影响 6.openEuler-24.03-LTS-Next(6.6.0):不受影响 7.openEuler-24.03-LTS-SP1(6.6.0):不受影响 8.openEuler-24.03-LTS-SP2(6.6.0):不受影响 修复是否涉及abi变化(是/否): 1.master(6.12.33):否 2.openEuler-20.03-LTS-SP4(4.19.90):否 3.openEuler-22.03-LTS-SP3(5.10.0):否 4.openEuler-22.03-LTS-SP4(5.10.0):否 5.openEuler-24.03-LTS(6.6.0):否 6.openEuler-24.03-LTS-Next(6.6.0):否 7.openEuler-24.03-LTS-SP1(6.6.0):否 8.openEuler-24.03-LTS-SP2(6.6.0):否 原因说明: 1.openEuler-20.03-LTS-SP4(4.19.90):正常修复 2.master(6.12.33):不受影响-漏洞代码不能被攻击者触发 3.openEuler-22.03-LTS-SP3(5.10.0):不受影响-漏洞代码不能被攻击者触发 4.openEuler-22.03-LTS-SP4(5.10.0):不受影响-漏洞代码不能被攻击者触发 5.openEuler-24.03-LTS(6.6.0):不受影响-漏洞代码不能被攻击者触发 6.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发 7.openEuler-24.03-LTS-SP1(6.6.0):不受影响-漏洞代码不能被攻击者触发 8.openEuler-24.03-LTS-SP2(6.6.0):不受影响-漏洞代码不能被攻击者触发 三、漏洞修复 安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-2406
Comments (
5
)
Sign in
to comment
Status
Done
Backlog
已挂起
Doing
Done
Declined
Assignees
Not set
CTC-Xibo.Wang
CTC-XiboWang
Assignee
Collaborator
+Assign
+Mention
Labels
CVE/FIXED
sig/Kernel
Not set
Projects
Unprojected
Unprojected
Milestones
No related milestones
No related milestones
Pull Requests
None yet
None yet
Successfully merging a pull request will close this issue.
Branches
No related branch
Branches (
-
)
Tags (
-
)
Planed to start   -   Planed to end
-
Top level
Not Top
Top Level: High
Top Level: Medium
Top Level: Low
Priority
Not specified
Serious
Main
Secondary
Unimportant
Duration
(hours)
参与者(2)
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel
Going to Help Center
Search
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
Comment
Repository Report
Back to the top
Login prompt
This operation requires login to the code cloud account. Please log in before operating.
Go to login
No account. Register