Toggle navigation
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Help
Log In
Help
Log In
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Home
Messages
Hashtags
Subgroups
×
×
×
Close
Likes
yocto-security@lists.yoctoproject.org
Messages
OE-core CVE metrics for dunfell on Sun 29 Jan 2023 02:30:01 AM HST
×
Close
Search
Single
Toggle Dropdown
Messages
Topics
Expanded
Polls
previous page
#745
next page
OE-core CVE metrics for dunfell on Sun 29 Jan 2023 02:30:01 AM HST
Steve Sakoman
#745
Branch: dunfell
New this week: 5 CVEs
CVE-2022-23521 (CVSS3: 9.8 CRITICAL): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23521
*
CVE-2022-41903 (CVSS3: 9.8 CRITICAL): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41903
*
CVE-2022-41953 (CVSS3: 7.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41953
*
CVE-2022-4743 (CVSS3: 7.5 HIGH): libsdl2:libsdl2-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4743
*
CVE-2023-22809 (CVSS3: 7.8 HIGH): sudo
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22809
*
Removed this week: 0 CVEs
Full list: Found 90 unpatched CVEs
CVE-2020-15469 (CVSS3: 2.3 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15469
*
CVE-2020-15705 (CVSS3: 6.4 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705
*
CVE-2020-15859 (CVSS3: 3.3 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15859
*
CVE-2020-17380 (CVSS3: 6.3 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17380
*
CVE-2020-25742 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25742
*
CVE-2020-25743 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25743
*
CVE-2020-27749 (CVSS3: 6.7 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749
*
CVE-2020-27918 (CVSS3: 7.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27918
*
CVE-2020-29510 (CVSS3: 5.6 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29510
*
CVE-2020-29623 (CVSS3: 3.3 LOW): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623
*
CVE-2020-35503 (CVSS3: 6.0 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503
*
CVE-2020-35504 (CVSS3: 6.0 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35504
*
CVE-2020-35505 (CVSS3: 4.4 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35505
*
CVE-2020-35506 (CVSS3: 6.7 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35506
*
CVE-2020-9948 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9948
*
CVE-2020-9951 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9951
*
CVE-2020-9952 (CVSS3: 7.1 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9952
*
CVE-2021-1765 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765
*
CVE-2021-1789 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789
*
CVE-2021-1799 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799
*
CVE-2021-1801 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801
*
CVE-2021-1870 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870
*
CVE-2021-20225 (CVSS3: 6.7 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225
*
CVE-2021-20233 (CVSS3: 8.2 HIGH): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233
*
CVE-2021-20269 (CVSS3: 5.5 MEDIUM): kexec-tools
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20269
*
CVE-2021-20295 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20295
*
CVE-2021-27097 (CVSS3: 7.8 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27097
*
CVE-2021-27138 (CVSS3: 7.8 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27138
*
CVE-2021-31879 (CVSS3: 6.1 MEDIUM): wget
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
*
CVE-2021-3409 (CVSS3: 5.7 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3409
*
CVE-2021-3418 (CVSS3: 6.4 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3418
*
CVE-2021-3445 (CVSS3: 7.5 HIGH): libdnf
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445
*
CVE-2021-35937 (CVSS3: 6.4 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35937
*
CVE-2021-35938 (CVSS3: 6.7 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35938
*
CVE-2021-35939 (CVSS3: 6.7 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35939
*
CVE-2021-3611 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3611
*
CVE-2021-3782 (CVSS3: 9.8 CRITICAL): wayland:wayland-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3782
*
CVE-2021-3800 (CVSS3: 7.5 HIGH): glib-2.0:glib-2.0-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3800
*
CVE-2021-3929 (CVSS3: 8.2 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3929
*
CVE-2021-3947 (CVSS3: 5.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3947
*
CVE-2021-42762 (CVSS3: 5.3 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42762
*
CVE-2021-45085 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45085
*
CVE-2021-45086 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45086
*
CVE-2021-45087 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45087
*
CVE-2021-45088 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45088
*
CVE-2021-45481 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45481
*
CVE-2021-45482 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45482
*
CVE-2021-45483 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45483
*
CVE-2021-45944 (CVSS3: 5.5 MEDIUM): ghostscript:ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45944
*
CVE-2022-0358 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0358
*
CVE-2022-1705 (CVSS3: 6.5 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1705
*
CVE-2022-1962 (CVSS3: 5.5 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1962
*
CVE-2022-2294 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2294
*
CVE-2022-2347 (CVSS3: 7.1 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2347
*
CVE-2022-23521 (CVSS3: 9.8 CRITICAL): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23521
*
CVE-2022-23773 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23773
*
CVE-2022-24765 (CVSS3: 7.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24765
*
CVE-2022-26354 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26354
*
CVE-2022-2953 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2953
*
CVE-2022-29536 (CVSS3: 7.5 HIGH): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29536
*
CVE-2022-2962 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2962
*
CVE-2022-30293 (CVSS3: 7.5 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30293
*
CVE-2022-30767 (CVSS3: 9.8 CRITICAL): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30767
*
CVE-2022-32893 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32893
*
CVE-2022-34835 (CVSS3: 9.8 CRITICAL): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34835
*
CVE-2022-3515 (CVSS3: 9.8 CRITICAL): gnupg:gnupg-native:libksba:libksba-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3515
*
CVE-2022-3570 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3570
*
CVE-2022-3597 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3597
*
CVE-2022-3598 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3598
*
CVE-2022-3599 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3599
*
CVE-2022-3626 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3626
*
CVE-2022-3627 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3627
*
CVE-2022-3715 (CVSS3: 7.8 HIGH): bash
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3715
*
CVE-2022-3872 (CVSS3: 8.6 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3872
*
CVE-2022-39177 (CVSS3: 8.8 HIGH): bluez5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39177
*
CVE-2022-39253 (CVSS3: 5.5 MEDIUM): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39253
*
CVE-2022-39260 (CVSS3: 8.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39260
*
CVE-2022-3970 (CVSS3: 8.8 HIGH): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3970
*
CVE-2022-4055 (CVSS3: 7.4 HIGH): xdg-utils
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055
*
CVE-2022-4144 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4144
*
CVE-2022-41716 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41716
*
CVE-2022-41720 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41720
*
CVE-2022-41903 (CVSS3: 9.8 CRITICAL): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41903
*
CVE-2022-41953 (CVSS3: 7.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41953
*
CVE-2022-4743 (CVSS3: 7.5 HIGH): libsdl2:libsdl2-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4743
*
CVE-2023-0049 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0049
*
CVE-2023-0051 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0051
*
CVE-2023-0054 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0054
*
CVE-2023-0288 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0288
*
CVE-2023-22809 (CVSS3: 7.8 HIGH): sudo
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22809
*
For further information see:
https://autobuilder.yocto.io/pub/non-release/patchmetrics/
More
All Messages By This Member
previous page
#745
next page
Join
{yocto-security@lists.yoctoproject.org to automatically receive all group messages.
×
Close
Report Message
Reason
Report to Moderators
I think this message isn't appropriate for our group. The Group moderators are responsible for maintaining their community and can address these issues.
Report to Yocto Project Support
I think this violates the Terms of Service. This includes: harm to minors, violence or threats, harassment or privacy invasion, impersonation or misrepresentation, fraud or phishing.
Note:
Your email address is included with the abuse report.
×
Close
Verify Delete
Are you sure you wish to delete this message from the message archives of yocto-security@lists.yoctoproject.org?
This cannot be undone.
×
Close
Verify Repost
Are you sure you wish to repost this message?
More Options
More
Home
Hashtags
Subgroups
Terms
Toggle navigation
Terms
©
2023
Groups.io