[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openembedded-core
Subject:    [OE-core] OE-core CVE metrics for langdale on Sun 29 Jan 2023 03:30:01 AM HST
From:       "Steve Sakoman" <steve () sakoman ! com>
Date:       2023-01-29 13:33:31
Message-ID: 20230129133331.48B4A960377 () nuc ! router0800d9 ! com
[Download RAW message or body]

Branch: langdale

New this week: 7 CVEs
CVE-2022-23521 (CVSS3: 9.8 CRITICAL): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23521 * CVE-2022-3515 \
(CVSS3: 9.8 CRITICAL): gnupg:gnupg-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3515 * CVE-2022-3550 \
(CVSS3: 8.8 HIGH): xserver-xorg \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3550 * CVE-2022-3551 \
(CVSS3: 6.5 MEDIUM): xserver-xorg \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3551 * CVE-2022-41903 \
(CVSS3: 9.8 CRITICAL): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41903 * CVE-2022-41953 \
(CVSS3: 7.8 HIGH): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41953 * CVE-2022-4743 \
(CVSS3: 7.5 HIGH): libsdl2:libsdl2-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4743 *

Removed this week: 9 CVEs
CVE-2022-3515 (CVSS3: 9.8 CRITICAL): gnupg:gnupg-native:libksba:libksba-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3515 * CVE-2022-39253 \
(CVSS3: 5.5 MEDIUM): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39253 * CVE-2022-39260 \
(CVSS3: 8.8 HIGH): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39260 * CVE-2022-43551 \
(CVSS3: 7.5 HIGH): curl:curl-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43551 * CVE-2022-47629 \
(CVSS3: 9.8 CRITICAL): libksba:libksba-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47629 * CVE-2023-0049 \
(CVSS3: 7.8 HIGH): vim https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0049 \
* CVE-2023-0051 (CVSS3: 7.8 HIGH): vim \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0051 * CVE-2023-0054 \
(CVSS3: 7.8 HIGH): vim https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0054 \
* CVE-2023-0288 (CVSS3: 7.8 HIGH): vim \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0288 *

Full list:  Found 20 unpatched CVEs
CVE-2020-10735 (CVSS3: 7.5 HIGH): python3:python3-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10735 * CVE-2022-23521 \
(CVSS3: 9.8 CRITICAL): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23521 * CVE-2022-3515 \
(CVSS3: 9.8 CRITICAL): gnupg:gnupg-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3515 * CVE-2022-3550 \
(CVSS3: 8.8 HIGH): xserver-xorg \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3550 * CVE-2022-3551 \
(CVSS3: 6.5 MEDIUM): xserver-xorg \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3551 * CVE-2022-37454 \
(CVSS3: 9.8 CRITICAL): python3:python3-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37454 * CVE-2022-3872 \
(CVSS3: 8.6 HIGH): qemu:qemu-native:qemu-system-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3872 * CVE-2022-3996 \
(CVSS3: 7.5 HIGH): openssl:openssl-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3996 * CVE-2022-40303 \
(CVSS3: 7.5 HIGH): libxml2:libxml2-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40303 * CVE-2022-40304 \
(CVSS3: 7.8 HIGH): libxml2:libxml2-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40304 * CVE-2022-4055 \
(CVSS3: 7.4 HIGH): xdg-utils \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055 * CVE-2022-40897 \
(CVSS3: 5.9 MEDIUM): python3-setuptools:python3-setuptools-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40897 * CVE-2022-4144 \
(CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4144 * CVE-2022-41903 \
(CVSS3: 9.8 CRITICAL): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41903 * CVE-2022-41953 \
(CVSS3: 7.8 HIGH): git \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41953 * CVE-2022-42919 \
(CVSS3: 7.8 HIGH): python3:python3-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42919 * CVE-2022-45061 \
(CVSS3: 7.5 HIGH): python3:python3-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45061 * CVE-2022-4603 \
(CVSS3: 8.8 HIGH): ppp https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4603 \
* CVE-2022-46908 (CVSS3: 7.3 HIGH): sqlite3:sqlite3-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46908 * CVE-2022-4743 \
(CVSS3: 7.5 HIGH): libsdl2:libsdl2-native \
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4743 *

For further information see: \
https://autobuilder.yocto.io/pub/non-release/patchmetrics/



-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#176475): https://lists.openembedded.org/g/openembedded-core/message/176475
Mute This Topic: https://lists.openembedded.org/mt/96605229/4454766
Group Owner: openembedded-core+owner@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [openembedded-core@marc.info]
-=-=-=-=-=-=-=-=-=-=-=-



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic