diff --git "a/PRODUCT_DOCS/Anolis OS \345\217\221\350\241\214\345\243\260\346\230\216/Anolis OS 23.2 \347\244\276\345\214\272\347\211\210 (GA) \345\217\221\350\241\214\345\243\260\346\230\216.md" "b/PRODUCT_DOCS/Anolis OS \345\217\221\350\241\214\345\243\260\346\230\216/Anolis OS 23.2 \347\244\276\345\214\272\347\211\210 (GA) \345\217\221\350\241\214\345\243\260\346\230\216.md" index 197cc737b9f4adf164b1f1da030db483d8b73020..b8254ee3a42079a623812b5aec7bc19fcdaf5b28 100644 --- "a/PRODUCT_DOCS/Anolis OS \345\217\221\350\241\214\345\243\260\346\230\216/Anolis OS 23.2 \347\244\276\345\214\272\347\211\210 (GA) \345\217\221\350\241\214\345\243\260\346\230\216.md" +++ "b/PRODUCT_DOCS/Anolis OS \345\217\221\350\241\214\345\243\260\346\230\216/Anolis OS 23.2 \347\244\276\345\214\272\347\211\210 (GA) \345\217\221\350\241\214\345\243\260\346\230\216.md" @@ -206,184 +206,184 @@ lcr.loongnix.cn/openanolis/anolisos:23.2 | loongarch64 架构容器镜像 ## 3.安全修复 以下仅展示已修复的重要 CVE -CVE 编号 | 严重等级 | 影响软件包 | ------|-----|----- | -CVE-2022-38928 | Important | xpdf | -CVE-2022-38222 | Important | xpdf | -CVE-2024-52804 | Important | python-tornado | -CVE-2024-52336 | Important | tuned | -CVE-2024-11236 | Moderate | php | -CVE-2024-8932 | Moderate | php | -CVE-2024-52316 | Low | tomcat | -CVE-2023-46047 | Important | sane-backends | -CVE-2024-52531 | Low | libsoup3 | -CVE-2023-52424 | Moderate | wpa_supplicant | -CVE-2024-1013 | Moderate | unixODBC | -CVE-2024-31449 | Moderate | redis | -CVE-2024-25081 | Moderate | fontforge | -CVE-2024-25082 | Moderate | fontforge | -CVE-2024-8926 | Important | php | -CVE-2024-8927 | Important | php | -CVE-2024-39614 | Moderate | python-django | -CVE-2024-41989 | Moderate | python-django | -CVE-2024-41990 | Moderate | python-django | -CVE-2024-41991 | Moderate | python-django | -CVE-2024-42005 | Moderate | python-django | -CVE-2024-5197 | Moderate | libvpx | -CVE-2024-6602 | Important | firefox | -CVE-2024-9680 | Important | firefox | -CVE-2024-6606 | Important | firefox | -CVE-2024-6611 | Important | firefox | -CVE-2024-24258 | Moderate | freeglut | -CVE-2024-24259 | Moderate | freeglut | -CVE-2024-39573 | Important | httpd | -CVE-2024-38477 | Important | httpd | -CVE-2024-38476 | Important | httpd | -CVE-2024-38475 | Important | httpd | -CVE-2024-38474 | Important | httpd | -CVE-2024-38473 | Important | httpd | -CVE-2024-38472 | Important | httpd | -CVE-2024-36387 | Important | httpd | -CVE-2024-39884 | Important | httpd | -CVE-2024-40898 | Important | httpd | -CVE-2024-40725 | Important | httpd | -CVE-2022-47630 | Important | arm-trusted-firmware | -CVE-2024-47191 | Important | oath-toolkit | -CVE-2024-2357 | Moderate | libreswan | -CVE-2024-9780 | Important | wireshark | -CVE-2024-0208 | Important | wireshark | -CVE-2024-0209 | Important | wireshark | -CVE-2024-45802 | Important | squid | -CVE-2024-26328 | Moderate | qemu | -CVE-2024-3447 | Moderate | qemu | -CVE-2024-4693 | Moderate | qemu | -CVE-2022-34835 | Critical | uboot-tools | -CVE-2024-34062 | Moderate | python-tqdm | -CVE-2024-35740 | Moderate | tomcat | -CVE-2024-39936 | Moderate | qt5-qtbase | -CVE-2022-33967 | Important | uboot-tools | -CVE-2024-2511 | Low | openssl | -CVE-2024-26458 | Low | krb5 | -CVE-2024-26461 | Low | krb5 | -CVE-2024-2961 | Important | glibc | -CVE-2024-27305 | Moderate | python-aiosmtpd | -CVE-2024-28182 | Moderate | nghttp2 | -CVE-2024-28219 | Moderate | python-pillow | -CVE-2024-30202 | Moderate | emacs | -CVE-2024-30203 | Moderate | emacs | -CVE-2024-30204 | Moderate | emacs | -CVE-2024-30205 | Moderate | emacs | -CVE-2024-31744 | Important | jasper | -CVE-2023-51107 | Important | mupdf | -CVE-2023-49355 | Important | jq | -CVE-2023-45924 | Critical | libglvnd | -CVE-2023-51103 | Important | mupdf | -CVE-2023-51104 | Important | mupdf | -CVE-2023-51105 | Important | mupdf | -CVE-2024-39917 | Important | xrdp | -CVE-2024-24576 | Critical | rust | -CVE-2023-46045 | Important | graphviz | -CVE-2024-35241 | Important | composer | -CVE-2024-3019 | Important | pcp | -CVE-2024-5569 | Moderate | python-zipp | -CVE-2024-4418 | Moderate | libvirt | -CVE-2024-39329 | Low | python-django | -CVE-2024-37894 | Moderate | squid | -CVE-2024-37891 | Moderate | python-urllib3 | -CVE-2024-5742 | Low | nano | -CVE-2024-6126 | Low | cockpit | -CVE-2024-5206 | Moderate | python-scikit-learn | -CVE-2024-35235 | Moderate | cups | -CVE-2024-26256 | Moderate | libarchive | -CVE-2024-38517 | Moderate | rapidjson | -CVE-2024-1737 | Important | bind | -CVE-2024-1975 | Important | bind | -CVE-2023-7104 | Moderate | sqlite | -CVE-2024-22667 | Low | vim | -CVE-2023-45236 | Moderate | edk2 | -CVE-2023-45237 | Moderate | edk2 | -CVE-2024-4076 | Important | bind | -CVE-2024-2756 | Important | php | -CVE-2024-3096 | Important | php | -CVE-2024-5585 | Important | php | -CVE-2024-1874 | Important | php | -CVE-2024-31083 | Important | xorg-x11-server-Xwayland | -CVE-2024-6655 | Moderate | gtk2 | -CVE-2024-0985 | Important | postgresql | -CVE-2024-24806 | Moderate | libuv | -CVE-2024-5564 | Important | libndp | -CVE-2024-5629 | Low | python-pymongo | -CVE-2023-50967 | Moderate | jose | -CVE-2023-5366 | Moderate | openvswitch | -CVE-2024-25111 | Important | squid | -CVE-2023-5841 | Important | OpenEXR | -CVE-2023-6683 | Moderate | qemu | -CVE-2023-6693 | Moderate | qemu | -CVE-2024-26327 | Moderate | qemu | -CVE-2024-2955 | Moderate | wireshark | -CVE-2024-22201 | Moderate | jetty | -CVE-2023-48161 | Moderate | giflib | -CVE-2024-0743 | Important | firefox | -CVE-2024-2605 | Important | firefox | -CVE-2024-5688 | Important | firefox | -CVE-2024-5700 | Important | firefox | -CVE-2024-5702 | Important | firefox | -CVE-2023-52355 | Moderate | libtiff | -CVE-2023-52356 | Moderate | libtiff | -CVE-2024-25062 | Moderate | libxml2 | -CVE-2024-34459 | Moderate | libxml2 | -CVE-2024-34069 | Important | python-werkzeug | -CVE-2024-31745 | Moderate | libdwarf | -CVE-2024-3205 | Low | libyaml | -CVE-2023-3955 | Important | kubernetes | -CVE-2023-29483 | Moderate | python-dns | -CVE-2024-29040 | Moderate | tpm2-tss | -CVE-2022-48622 | Moderate | gdk-pixbuf2 | -CVE-2024-29510 | Important | ghostscript | -CVE-2024-33869 | Important | ghostscript | -CVE-2024-33870 | Important | ghostscript | -CVE-2024-33871 | Important | ghostscript | -CVE-2023-52425 | Moderate | expat | -CVE-2024-34064 | Moderate | python-jinja2 | -CVE-2024-4603 | Low | openssl | -CVE-2024-24789 | Moderate | golang | -CVE-2024-35195 | Moderate | python-requests | -CVE-2024-1975 | Important | bind | -CVE-2024-38875 | Moderate | python-django | -CVE-2024-4340 | Moderate | python-sqlparse | -CVE-2024-3446 | Moderate | qemu | -CVE-2024-20993 | Moderate | mysql | -CVE-2024-20994 | Moderate | mysql | -CVE-2024-20998 | Moderate | mysql | -CVE-2024-21000 | Moderate | mysql | -CVE-2024-21008 | Moderate | mysql | -CVE-2024-21009 | Moderate | mysql | -CVE-2024-21013 | Moderate | mysql | -CVE-2024-21015 | Moderate | mysql | -CVE-2024-21047 | Moderate | mysql | -CVE-2024-21049 | Moderate | mysql | -CVE-2024-21050 | Moderate | mysql | -CVE-2024-21051 | Moderate | mysql | -CVE-2024-21052 | Moderate | mysql | -CVE-2024-21053 | Moderate | mysql | -CVE-2024-21054 | Moderate | mysql | -CVE-2024-21055 | Moderate | mysql | -CVE-2024-21056 | Moderate | mysql | -CVE-2024-21057 | Moderate | mysql | -CVE-2024-21060 | Moderate | mysql | -CVE-2024-21061 | Moderate | mysql | -CVE-2024-21062 | Moderate | mysql | -CVE-2024-21069 | Moderate | mysql | -CVE-2024-21087 | Moderate | mysql | -CVE-2024-21096 | Moderate | mysql | -CVE-2024-21102 | Moderate | mysql | -CVE-2023-6237 | Low | openssl | -CVE-2023-51765 | Moderate | sendmail | -CVE-2024-23638 | Moderate | squid | -CVE-2023-6917 | Moderate | pcp | -CVE-2024-24246 | Moderate | qpdf | -CVE-2024-1931 | Moderate | unbound | -CVE-2024-6387 | Important | openssh | +CVE 编号 | 严重等级 | 影响软件包 +-----|-----|----- +CVE-2022-38928 | Important | xpdf +CVE-2022-38222 | Important | xpdf +CVE-2024-52804 | Important | python-tornado +CVE-2024-52336 | Important | tuned +CVE-2024-11236 | Moderate | php +CVE-2024-8932 | Moderate | php +CVE-2024-52316 | Low | tomcat +CVE-2023-46047 | Important | sane-backends +CVE-2024-52531 | Low | libsoup3 +CVE-2023-52424 | Moderate | wpa_supplicant +CVE-2024-1013 | Moderate | unixODBC +CVE-2024-31449 | Moderate | redis +CVE-2024-25081 | Moderate | fontforge +CVE-2024-25082 | Moderate | fontforge +CVE-2024-8926 | Important | php +CVE-2024-8927 | Important | php +CVE-2024-39614 | Moderate | python-django +CVE-2024-41989 | Moderate | python-django +CVE-2024-41990 | Moderate | python-django +CVE-2024-41991 | Moderate | python-django +CVE-2024-42005 | Moderate | python-django +CVE-2024-5197 | Moderate | libvpx +CVE-2024-6602 | Important | firefox +CVE-2024-9680 | Important | firefox +CVE-2024-6606 | Important | firefox +CVE-2024-6611 | Important | firefox +CVE-2024-24258 | Moderate | freeglut +CVE-2024-24259 | Moderate | freeglut +CVE-2024-39573 | Important | httpd +CVE-2024-38477 | Important | httpd +CVE-2024-38476 | Important | httpd +CVE-2024-38475 | Important | httpd +CVE-2024-38474 | Important | httpd +CVE-2024-38473 | Important | httpd +CVE-2024-38472 | Important | httpd +CVE-2024-36387 | Important | httpd +CVE-2024-39884 | Important | httpd +CVE-2024-40898 | Important | httpd +CVE-2024-40725 | Important | httpd +CVE-2022-47630 | Important | arm-trusted-firmware +CVE-2024-47191 | Important | oath-toolkit +CVE-2024-2357 | Moderate | libreswan +CVE-2024-9780 | Important | wireshark +CVE-2024-0208 | Important | wireshark +CVE-2024-0209 | Important | wireshark +CVE-2024-45802 | Important | squid +CVE-2024-26328 | Moderate | qemu +CVE-2024-3447 | Moderate | qemu +CVE-2024-4693 | Moderate | qemu +CVE-2022-34835 | Critical | uboot-tools +CVE-2024-34062 | Moderate | python-tqdm +CVE-2024-35740 | Moderate | tomcat +CVE-2024-39936 | Moderate | qt5-qtbase +CVE-2022-33967 | Important | uboot-tools +CVE-2024-2511 | Low | openssl +CVE-2024-26458 | Low | krb5 +CVE-2024-26461 | Low | krb5 +CVE-2024-2961 | Important | glibc +CVE-2024-27305 | Moderate | python-aiosmtpd +CVE-2024-28182 | Moderate | nghttp2 +CVE-2024-28219 | Moderate | python-pillow +CVE-2024-30202 | Moderate | emacs +CVE-2024-30203 | Moderate | emacs +CVE-2024-30204 | Moderate | emacs +CVE-2024-30205 | Moderate | emacs +CVE-2024-31744 | Important | jasper +CVE-2023-51107 | Important | mupdf +CVE-2023-49355 | Important | jq +CVE-2023-45924 | Critical | libglvnd +CVE-2023-51103 | Important | mupdf +CVE-2023-51104 | Important | mupdf +CVE-2023-51105 | Important | mupdf +CVE-2024-39917 | Important | xrdp +CVE-2024-24576 | Critical | rust +CVE-2023-46045 | Important | graphviz +CVE-2024-35241 | Important | composer +CVE-2024-3019 | Important | pcp +CVE-2024-5569 | Moderate | python-zipp +CVE-2024-4418 | Moderate | libvirt +CVE-2024-39329 | Low | python-django +CVE-2024-37894 | Moderate | squid +CVE-2024-37891 | Moderate | python-urllib3 +CVE-2024-5742 | Low | nano +CVE-2024-6126 | Low | cockpit +CVE-2024-5206 | Moderate | python-scikit-learn +CVE-2024-35235 | Moderate | cups +CVE-2024-26256 | Moderate | libarchive +CVE-2024-38517 | Moderate | rapidjson +CVE-2024-1737 | Important | bind +CVE-2024-1975 | Important | bind +CVE-2023-7104 | Moderate | sqlite +CVE-2024-22667 | Low | vim +CVE-2023-45236 | Moderate | edk2 +CVE-2023-45237 | Moderate | edk2 +CVE-2024-4076 | Important | bind +CVE-2024-2756 | Important | php +CVE-2024-3096 | Important | php +CVE-2024-5585 | Important | php +CVE-2024-1874 | Important | php +CVE-2024-31083 | Important | xorg-x11-server-Xwayland +CVE-2024-6655 | Moderate | gtk2 +CVE-2024-0985 | Important | postgresql +CVE-2024-24806 | Moderate | libuv +CVE-2024-5564 | Important | libndp +CVE-2024-5629 | Low | python-pymongo +CVE-2023-50967 | Moderate | jose +CVE-2023-5366 | Moderate | openvswitch +CVE-2024-25111 | Important | squid +CVE-2023-5841 | Important | OpenEXR +CVE-2023-6683 | Moderate | qemu +CVE-2023-6693 | Moderate | qemu +CVE-2024-26327 | Moderate | qemu +CVE-2024-2955 | Moderate | wireshark +CVE-2024-22201 | Moderate | jetty +CVE-2023-48161 | Moderate | giflib +CVE-2024-0743 | Important | firefox +CVE-2024-2605 | Important | firefox +CVE-2024-5688 | Important | firefox +CVE-2024-5700 | Important | firefox +CVE-2024-5702 | Important | firefox +CVE-2023-52355 | Moderate | libtiff +CVE-2023-52356 | Moderate | libtiff +CVE-2024-25062 | Moderate | libxml2 +CVE-2024-34459 | Moderate | libxml2 +CVE-2024-34069 | Important | python-werkzeug +CVE-2024-31745 | Moderate | libdwarf +CVE-2024-3205 | Low | libyaml +CVE-2023-3955 | Important | kubernetes +CVE-2023-29483 | Moderate | python-dns +CVE-2024-29040 | Moderate | tpm2-tss +CVE-2022-48622 | Moderate | gdk-pixbuf2 +CVE-2024-29510 | Important | ghostscript +CVE-2024-33869 | Important | ghostscript +CVE-2024-33870 | Important | ghostscript +CVE-2024-33871 | Important | ghostscript +CVE-2023-52425 | Moderate | expat +CVE-2024-34064 | Moderate | python-jinja2 +CVE-2024-4603 | Low | openssl +CVE-2024-24789 | Moderate | golang +CVE-2024-35195 | Moderate | python-requests +CVE-2024-1975 | Important | bind +CVE-2024-38875 | Moderate | python-django +CVE-2024-4340 | Moderate | python-sqlparse +CVE-2024-3446 | Moderate | qemu +CVE-2024-20993 | Moderate | mysql +CVE-2024-20994 | Moderate | mysql +CVE-2024-20998 | Moderate | mysql +CVE-2024-21000 | Moderate | mysql +CVE-2024-21008 | Moderate | mysql +CVE-2024-21009 | Moderate | mysql +CVE-2024-21013 | Moderate | mysql +CVE-2024-21015 | Moderate | mysql +CVE-2024-21047 | Moderate | mysql +CVE-2024-21049 | Moderate | mysql +CVE-2024-21050 | Moderate | mysql +CVE-2024-21051 | Moderate | mysql +CVE-2024-21052 | Moderate | mysql +CVE-2024-21053 | Moderate | mysql +CVE-2024-21054 | Moderate | mysql +CVE-2024-21055 | Moderate | mysql +CVE-2024-21056 | Moderate | mysql +CVE-2024-21057 | Moderate | mysql +CVE-2024-21060 | Moderate | mysql +CVE-2024-21061 | Moderate | mysql +CVE-2024-21062 | Moderate | mysql +CVE-2024-21069 | Moderate | mysql +CVE-2024-21087 | Moderate | mysql +CVE-2024-21096 | Moderate | mysql +CVE-2024-21102 | Moderate | mysql +CVE-2023-6237 | Low | openssl +CVE-2023-51765 | Moderate | sendmail +CVE-2024-23638 | Moderate | squid +CVE-2023-6917 | Moderate | pcp +CVE-2024-24246 | Moderate | qpdf +CVE-2024-1931 | Moderate | unbound +CVE-2024-6387 | Important | openssh ## 4.已知问题 @@ -410,6 +410,7 @@ Anolis OS 23 操作系统发行版不提供任何形式的书面或暗示的保 ### 研发贡献 *以下排名不分先后* + 领域 | 功能支持贡献方 -----|----- 架构支撑 | 龙芯中科、海光信息、飞腾、Intel @@ -419,8 +420,10 @@ Anolis OS 23 操作系统发行版不提供任何形式的书面或暗示的保 基础软件包开发及维护 | 中兴通讯、浪潮信息、中科曙光、中科方德、红旗软件、龙芯中科、统信软件、阿里云 重要 CVE 修复 | 中科方德、浪潮信息、中科曙光、红旗软件、统信软件、中兴通讯、阿里云 + ### 测试贡献 *以下排名不分先后* + 理事 | 测试分工 -----|----- 海光信息 | 负责海光芯片平台内核、硬件兼容性测试 @@ -431,6 +434,7 @@ Anolis OS 23 操作系统发行版不提供任何形式的书面或暗示的保 中科曙光 | 负责曙光主流机型安装启动测试、通用安装启动测试 阿里云 | 负责通用架构机型的全量测试 + ### 反馈 + [Bug 跟踪](https://bugzilla.openanolis.cn/) + [邮件列表讨论](http://lists.openanolis.cn/)