登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
模力方舟
AI 队友
登录
注册
12月21日就在北京,来看大模型推理 + 国产硬件生态 + 开源社区分享,一起搞技术、聊开源、领福利~~
代码拉取完成,页面将自动刷新
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
13
Star
0
Fork
74
src-openEuler
/
coreutils
代码
Issues
1
Pull Requests
0
Wiki
统计
流水线
服务
JavaDoc
PHPDoc
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
SBOM
我知道了,不再自动展开
更新失败,请稍后重试!
移除标识
内容风险标识
本任务被
标识为内容中包含有代码安全 Bug 、隐私泄露等敏感信息,仓库外成员不可访问
回合上游社区补丁,补丁数量:7
已完成
#ICTPAP
缺陷
peulerosci
创建于
2025-08-19 17:10
<h3>优先级:</h3><p>次要</p><p></p><h3>详细描述:</h3><p></p><p> 【OS版本】:被测的版本信息</p><p></p><p>oe 2403</p><p></p><p> 【测试类型】:发现问题的测试类型,功能测试、可靠性测试、性能测试等</p><p></p><p></p><p> 【测试步骤】:详细描述可以复现该问题的测试步骤</p><p></p><p></p><p> 【结果输出】:根据上述测试步骤执行后,系统的实际输出</p><p></p><p></p><p> 【预期输出】:系统在上述测试步骤操作后,按照系统设计应该输出的结果</p><p></p><p>coreutils高版本社区补丁回合共5个</p><p></p><p> 【测试代码】:发现问题的测试代码,或者关键片段,能指导问题复现</p><p></p><p>不涉及</p><p></p><p> 【初步定位结论】:已明确的相关定位信息或者相关的沟通交流信息</p><p></p><p>待回合补丁列表:</p><p></p><p></p><table ><tr><td colSpan="1" rowSpan="1">包</td><td colSpan="1" rowSpan="1">CommitId</td><td colSpan="1" rowSpan="1">描述</td></tr><tr><td colSpan="1" rowSpan="1"><span style="color:#252b3a"><span style="font-size:14px">coreutils</span></span></td><td colSpan="1" rowSpan="1"><u>9907b6f5dc3faf370c916c2f81bfcc3d06028e83</u></td><td colSpan="1" rowSpan="1">cp,mv: reinstate that -n exits with success if files skipped<br/><br/>* src/cp.c (main): Adjust so that -n will exit success if skipped files.<br/>* src/mv.c (main): Likewise.<br/>* doc/coreutils.texi (cp invocation): Adjust the description of -n.<br/>* src/system.h (emit_update_parameters_note): Adjust --update=none<br/>comparison.<br/>* tests/cp/cp-i.sh: Adjust -n exit status checks.<br/>* tests/mv/mv-n.sh: Likewise.<br/>* NEWS: Mention the change in behavior.<br/>Fixes https://bugs.gnu.org/62572</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/e07161d4af89dbf82311ca396ac0916aa90b7301" target="_blank" rel="noopener noreferrer" class="ql-normal-link">e07161d4af89dbf82311ca396ac0916aa90b7301</a></td><td colSpan="1" rowSpan="1">sort: fix --debug buffer overrun<br/><br/>* src/sort.c (debug_key): Fix undefined behavior when a key ends<br/>before it starts. Problem reported by Bruno Haible<br/><https://bugs.gnu.org/75606>.</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/261f13bcf84a6f7a3241bab48c074879db789fca" target="_blank" rel="noopener noreferrer" class="ql-normal-link">261f13bcf84a6f7a3241bab48c074879db789fca</a></td><td colSpan="1" rowSpan="1">yes: avoid failure on CHERI protected systems<br/><br/>* src/yes.c (main): Don't reuse the argv array as CHERI's<br/>capability bounds do not allow for that, failing like:<br/> $ yes $(seq 156) | head -n1<br/> In-address space security exception (core dumped)</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><u>d60e550ed0ba67455a5952fe8adf27dacf47e680</u></td><td colSpan="1" rowSpan="1">tac: avoid out of bounds access<br/><br/>This was flagged on CheriBSD on ARM Morello with the error:<br/>In-address space security exception (core dumped)<br/>triggered with: tac -s '' /dev/null<br/><br/>* src/tac.c (main): Ensure we don't read beyond the<br/>end of the supplied optarg.</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><u>6229ac946e6ee36158db1a592279671d79a9737a</u></td><td colSpan="1" rowSpan="1">numfmt: don't require a suffix with --from=iec-i<br/><br/>* src/numfmt.c (simple_strtod_human): Only look for 'i'<br/>after detecting a suffix.<br/>* tests/misc/numfmt.pl: Add a test case.<br/>* NEWS: Mention the bug fix.<br/>Reported at https://bugs.debian.org/1091758</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/a6ab944e19684d0ccd0568fa8c06f71921c1e6c3" target="_blank" rel="noopener noreferrer" class="ql-normal-link">a6ab944e19684d0ccd0568fa8c06f71921c1e6c3</a></td><td colSpan="1" rowSpan="1">cp,mv: ensure -i,f are not overridden by -u<br/><br/>Since coreutils 9.3 we had --update={all,older} override -i.<br/>In coreutils 9.5 this was expanded to -u<br/>(to make it consistent with --update=older).<br/><br/>This patch reinstates things so that -i combines with -u instead.<br/>I.e. have -i be protective, rather than selective (like -u).<br/><br/>The -f option of mv is similarly adjusted in this patch,<br/>so now --update does not override any of -f,-i,-n.</td></tr></table><p></p><p></p><p></p><p></p> **二、缺陷分析结构反馈** 影响性分析说明: 缺陷严重等级:(Critical/High/Moderate/Low) 缺陷根因说明: 受影响版本排查(受影响/不受影响): openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP3 openEuler-22.03-LTS-SP4 openEuler-24.03-LTS openEuler-24.03-LTS-SP1 openEuler-24.03-LTS-SP2 修复是否涉及abi变化(是/否): openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP3 openEuler-22.03-LTS-SP4 openEuler-24.03-LTS openEuler-24.03-LTS-SP1 openEuler-24.03-LTS-SP2
<h3>优先级:</h3><p>次要</p><p></p><h3>详细描述:</h3><p></p><p> 【OS版本】:被测的版本信息</p><p></p><p>oe 2403</p><p></p><p> 【测试类型】:发现问题的测试类型,功能测试、可靠性测试、性能测试等</p><p></p><p></p><p> 【测试步骤】:详细描述可以复现该问题的测试步骤</p><p></p><p></p><p> 【结果输出】:根据上述测试步骤执行后,系统的实际输出</p><p></p><p></p><p> 【预期输出】:系统在上述测试步骤操作后,按照系统设计应该输出的结果</p><p></p><p>coreutils高版本社区补丁回合共5个</p><p></p><p> 【测试代码】:发现问题的测试代码,或者关键片段,能指导问题复现</p><p></p><p>不涉及</p><p></p><p> 【初步定位结论】:已明确的相关定位信息或者相关的沟通交流信息</p><p></p><p>待回合补丁列表:</p><p></p><p></p><table ><tr><td colSpan="1" rowSpan="1">包</td><td colSpan="1" rowSpan="1">CommitId</td><td colSpan="1" rowSpan="1">描述</td></tr><tr><td colSpan="1" rowSpan="1"><span style="color:#252b3a"><span style="font-size:14px">coreutils</span></span></td><td colSpan="1" rowSpan="1"><u>9907b6f5dc3faf370c916c2f81bfcc3d06028e83</u></td><td colSpan="1" rowSpan="1">cp,mv: reinstate that -n exits with success if files skipped<br/><br/>* src/cp.c (main): Adjust so that -n will exit success if skipped files.<br/>* src/mv.c (main): Likewise.<br/>* doc/coreutils.texi (cp invocation): Adjust the description of -n.<br/>* src/system.h (emit_update_parameters_note): Adjust --update=none<br/>comparison.<br/>* tests/cp/cp-i.sh: Adjust -n exit status checks.<br/>* tests/mv/mv-n.sh: Likewise.<br/>* NEWS: Mention the change in behavior.<br/>Fixes https://bugs.gnu.org/62572</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/e07161d4af89dbf82311ca396ac0916aa90b7301" target="_blank" rel="noopener noreferrer" class="ql-normal-link">e07161d4af89dbf82311ca396ac0916aa90b7301</a></td><td colSpan="1" rowSpan="1">sort: fix --debug buffer overrun<br/><br/>* src/sort.c (debug_key): Fix undefined behavior when a key ends<br/>before it starts. Problem reported by Bruno Haible<br/><https://bugs.gnu.org/75606>.</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/261f13bcf84a6f7a3241bab48c074879db789fca" target="_blank" rel="noopener noreferrer" class="ql-normal-link">261f13bcf84a6f7a3241bab48c074879db789fca</a></td><td colSpan="1" rowSpan="1">yes: avoid failure on CHERI protected systems<br/><br/>* src/yes.c (main): Don't reuse the argv array as CHERI's<br/>capability bounds do not allow for that, failing like:<br/> $ yes $(seq 156) | head -n1<br/> In-address space security exception (core dumped)</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><u>d60e550ed0ba67455a5952fe8adf27dacf47e680</u></td><td colSpan="1" rowSpan="1">tac: avoid out of bounds access<br/><br/>This was flagged on CheriBSD on ARM Morello with the error:<br/>In-address space security exception (core dumped)<br/>triggered with: tac -s '' /dev/null<br/><br/>* src/tac.c (main): Ensure we don't read beyond the<br/>end of the supplied optarg.</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><u>6229ac946e6ee36158db1a592279671d79a9737a</u></td><td colSpan="1" rowSpan="1">numfmt: don't require a suffix with --from=iec-i<br/><br/>* src/numfmt.c (simple_strtod_human): Only look for 'i'<br/>after detecting a suffix.<br/>* tests/misc/numfmt.pl: Add a test case.<br/>* NEWS: Mention the bug fix.<br/>Reported at https://bugs.debian.org/1091758</td></tr><tr><td colSpan="1" rowSpan="1">coreutils</td><td colSpan="1" rowSpan="1"><a href="https://github.com/coreutils/coreutils/commit/a6ab944e19684d0ccd0568fa8c06f71921c1e6c3" target="_blank" rel="noopener noreferrer" class="ql-normal-link">a6ab944e19684d0ccd0568fa8c06f71921c1e6c3</a></td><td colSpan="1" rowSpan="1">cp,mv: ensure -i,f are not overridden by -u<br/><br/>Since coreutils 9.3 we had --update={all,older} override -i.<br/>In coreutils 9.5 this was expanded to -u<br/>(to make it consistent with --update=older).<br/><br/>This patch reinstates things so that -i combines with -u instead.<br/>I.e. have -i be protective, rather than selective (like -u).<br/><br/>The -f option of mv is similarly adjusted in this patch,<br/>so now --update does not override any of -f,-i,-n.</td></tr></table><p></p><p></p><p></p><p></p> **二、缺陷分析结构反馈** 影响性分析说明: 缺陷严重等级:(Critical/High/Moderate/Low) 缺陷根因说明: 受影响版本排查(受影响/不受影响): openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP3 openEuler-22.03-LTS-SP4 openEuler-24.03-LTS openEuler-24.03-LTS-SP1 openEuler-24.03-LTS-SP2 修复是否涉及abi变化(是/否): openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP3 openEuler-22.03-LTS-SP4 openEuler-24.03-LTS openEuler-24.03-LTS-SP1 openEuler-24.03-LTS-SP2
评论 (
3
)
登录
后才可以发表评论
状态
已完成
待办的
已挂起
修复中
已确认
已完成
已验收
已取消
负责人
未设置
chenjiayi
jiayi0118
负责人
协作者
+负责人
+协作者
标签
sig/Base-service
未设置
项目
未立项任务
未立项任务
里程碑
未关联里程碑
未关联里程碑
Pull Requests
未关联
未关联
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
未关联
分支 (60)
标签 (30)
master
openEuler-24.03-LTS-SP3
openEuler-24.03-LTS-SP2
openEuler-24.03-LTS-SP1
openEuler-24.03-LTS
openEuler-24.03-LTS-Next
openEuler-25.09
openEuler-22.03-LTS-SP4
openEuler-22.03-LTS-SP3
openEuler-20.03-LTS-SP4
openEuler-25.03
openEuler-22.03-LTS-SP1
openEuler-24.09
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS-SP2
openEuler-22.03-LTS-Next
openEuler-22.03-LTS
openEuler-23.09
openEuler-23.03
openEuler-22.09
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS
openEuler-21.09
openEuler-21.03
openEuler-20.03-LTS-Next
openEuler-20.09
patch-tracking/20210103225849748336
patch-tracking/20210102205849748304
patch-tracking/20210102015849749612
patch-tracking/20201229005849748743
patch-tracking/20201225145849748845
patch-tracking/20201218235849749781
patch-tracking/20201216045849751437
patch-tracking/20201215225849748592
patch-tracking/20201212115849747583
patch-tracking/20201209045849748654
patch-tracking/20201201225849750631
patch-tracking/20201128045849750004
patch-tracking/20201127043007634347
patch-tracking/20201126233007632855
patch-tracking/20201126223007636120
patch-tracking/20201123233007632138
patch-tracking/20201123183007631987
patch-tracking/20201123173007634294
patch-tracking/20201122233007634250
patch-tracking/20201122113007632935
patch-tracking/20201119083007632854
patch-tracking/20201117003007632079
patch-tracking/20201113043007635446
patch-tracking/20201112043007632460
patch-tracking/20201109063007633193
patch-tracking/20201028233007631828
patch-tracking/20201026233007633134
patch-tracking/20201026223007632810
patch-tracking/20201025223007649638
patch-tracking/20201020033007632984
patch-tracking/20201018003007632080
openEuler1.0
openEuler1.0-base
openEuler-25.09-release
openEuler-20.03-LTS-SP4-update-20250627
openEuler-24.03-LTS-SP2-release
openEuler-20.03-LTS-SP4-update-20250613
openEuler-22.03-LTS-SP3-update-20250613
openEuler-22.03-LTS-SP4-update-20250613
openEuler-24.03-LTS-update-20250613
openEuler-24.03-LTS-SP1-update-20250613
openEuler-25.03-release
openEuler-24.03-LTS-SP1-release
openEuler-22.03-LTS-SP4-release
openEuler-24.09-release
openEuler-24.03-LTS-release
openEuler-22.03-LTS-SP3-release
openEuler-23.09-rc5
openEuler-22.03-LTS-SP1-release
openEuler-22.09-release
openEuler-22.09-rc5
openEuler-22.09-20220829
openEuler-22.03-LTS-20220331
openEuler-22.03-LTS-round5
openEuler-22.03-LTS-round3
openEuler-22.03-LTS-round2
openEuler-22.03-LTS-round1
openEuler-20.03-LTS-SP3-release
openEuler-20.03-LTS-SP2-20210624
openEuler-21.03-20210330
openEuler-20.09-20200928
openEuler-20.03-LTS-20200606
openEuler-20.03-LTS-tag
开始日期   -   截止日期
-
置顶选项
不置顶
置顶等级:高
置顶等级:中
置顶等级:低
优先级
不指定
严重
主要
次要
不重要
预计工期
(小时)
参与者(1)
1
https://gitee.com/src-openeuler/coreutils.git
git@gitee.com:src-openeuler/coreutils.git
src-openeuler
coreutils
coreutils
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册