Toggle navigation
EN
EN
DE
ES
FR
IT
UK
Help
Log In
Help
Log In
EN
EN
DE
ES
FR
IT
UK
Home
Messages
Hashtags
Subgroups
×
×
×
Close
Likes
Yocto-Security
Messages
×
Close
Search
Single
Toggle Dropdown
Messages
Topics
Expanded
Polls
previous page
#785
next page
OE-core CVE metrics for langdale on Sun 26 Mar 2023 03:30:01 AM HST
Steve Sakoman
#785
Branch: langdale
New this week: 1 CVEs
CVE-2023-28531 (CVSS3: 9.8 CRITICAL): openssh
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28531
*
Removed this week: 18 CVEs
CVE-2022-41722 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41722
*
CVE-2022-41723 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41723
*
CVE-2022-41724 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41724
*
CVE-2022-41725 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41725
*
CVE-2023-0795 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0795
*
CVE-2023-0796 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0796
*
CVE-2023-0797 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0797
*
CVE-2023-0798 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0798
*
CVE-2023-0799 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0799
*
CVE-2023-1127 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1127
*
CVE-2023-1170 (CVSS3: 6.6 MEDIUM): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1170
*
CVE-2023-1175 (CVSS3: 6.6 MEDIUM): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1175
*
CVE-2023-1264 (CVSS3: 5.5 MEDIUM): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1264
*
CVE-2023-1355 (CVSS3: 5.5 MEDIUM): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1355
*
CVE-2023-22743 (CVSS3: 7.3 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22743
*
CVE-2023-24532 (CVSS3: 5.3 MEDIUM): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24532
*
CVE-2023-25193 (CVSS3: 7.5 HIGH): harfbuzz:harfbuzz-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25193
*
CVE-2023-27320 (CVSS3: 7.2 HIGH): sudo
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27320
*
Full list: Found 27 unpatched CVEs
CVE-2005-1796 (CVSS3: N/A): ncurses:ncurses-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1796
*
CVE-2020-10735 (CVSS3: 7.5 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10735
*
CVE-2022-3219 (CVSS3: 5.5 MEDIUM): gnupg:gnupg-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219
*
CVE-2022-3515 (CVSS3: 9.8 CRITICAL): gnupg:gnupg-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3515
*
CVE-2022-37454 (CVSS3: 9.8 CRITICAL): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37454
*
CVE-2022-3872 (CVSS3: 8.6 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3872
*
CVE-2022-4055 (CVSS3: 7.4 HIGH): xdg-utils
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055
*
CVE-2022-40897 (CVSS3: 5.9 MEDIUM): python3-setuptools:python3-setuptools-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40897
*
CVE-2022-42919 (CVSS3: 7.8 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42919
*
CVE-2022-44617 (CVSS3: 7.5 HIGH): libxpm
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44617
*
CVE-2022-45061 (CVSS3: 7.5 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45061
*
CVE-2022-46285 (CVSS3: 7.5 HIGH): libxpm
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46285
*
CVE-2022-4645 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4645
*
CVE-2022-46908 (CVSS3: 7.3 HIGH): sqlite3:sqlite3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46908
*
CVE-2022-4743 (CVSS3: 7.5 HIGH): libsdl2:libsdl2-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4743
*
CVE-2022-4883 (CVSS3: 8.8 HIGH): libxpm
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4883
*
CVE-2023-22795 (CVSS3: 7.5 HIGH): ruby:ruby-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22795
*
CVE-2023-23914 (CVSS3: 9.1 CRITICAL): curl:curl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23914
*
CVE-2023-23915 (CVSS3: 6.5 MEDIUM): curl:curl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23915
*
CVE-2023-23916 (CVSS3: 7.5 HIGH): curl:curl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23916
*
CVE-2023-24329 (CVSS3: 7.5 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24329
*
CVE-2023-25358 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25358
*
CVE-2023-25360 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25360
*
CVE-2023-25361 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25361
*
CVE-2023-25362 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25362
*
CVE-2023-25363 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25363
*
CVE-2023-28531 (CVSS3: 9.8 CRITICAL): openssh
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28531
*
For further information see:
https://autobuilder.yocto.io/pub/non-release/patchmetrics/
More
All Messages By This Member
previous page
#785
next page
Join
yocto-security@lists.yoctoproject.org to automatically receive all group messages.
×
Close
Report Message
Reason
Report to Moderators
I think this message isn't appropriate for our group. The Group moderators are responsible for maintaining their community and can address these issues.
Report to Yocto Project Support
I think this violates the Terms of Service. This includes: harm to minors, violence or threats, harassment or privacy invasion, impersonation or misrepresentation, fraud or phishing.
Note:
Your email address is included with the abuse report.
×
Close
Verify Delete
Are you sure you wish to delete this message from the message archives of yocto-security@lists.yoctoproject.org?
This cannot be undone.
×
Close
Verify Repost
Are you sure you wish to repost this message?
More Options
More
Home
Hashtags
Subgroups
Terms
Toggle navigation
Terms
©
2023
Groups.io