Toggle navigation
Help
Log In
Help
Log In
Home
Messages
Hashtags
Subgroups
×
×
×
Close
Likes
openembedded-core@lists.openembedded.org
Messages
OE-core CVE metrics for dunfell on Sun 20 Feb 2022 04:30:01 AM HST
×
Close
Search
Single
Toggle Dropdown
Messages
Topics
Expanded
previous page
#161984
next page
OE-core CVE metrics for dunfell on Sun 20 Feb 2022 04:30:01 AM HST
Steve Sakoman
#161984
Branch: dunfell
New this week: 9 CVEs
CVE-2021-45949: ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45949
*
CVE-2022-0529: unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0529
*
CVE-2022-0530: unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530
*
CVE-2022-0554: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0554
*
CVE-2022-0561: tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0561
*
CVE-2022-0562: tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0562
*
CVE-2022-23772: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23772
*
CVE-2022-23773: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23773
*
CVE-2022-23806: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23806
*
Removed this week: 6 CVEs
CVE-2020-25632: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632
*
CVE-2020-25647: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25647
*
CVE-2021-45949: ghostscript:ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45949
*
CVE-2022-23218: glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23218
*
CVE-2022-23219: glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23219
*
CVE-2022-23852: expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23852
*
Full list: Found 120 unpatched CVEs
CVE-2018-21232: re2c:re2c-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-21232
*
CVE-2019-12067: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067
*
CVE-2020-13253: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13253
*
CVE-2020-13754: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13754
*
CVE-2020-13791: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13791
*
CVE-2020-15469: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15469
*
CVE-2020-15705: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705
*
CVE-2020-15859: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15859
*
CVE-2020-15900: ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15900
*
CVE-2020-15999: freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15999
*
CVE-2020-16590: binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16590
*
CVE-2020-16591: binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16591
*
CVE-2020-16599: binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16599
*
CVE-2020-17380: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17380
*
CVE-2020-18974: nasm:nasm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974
*
CVE-2020-25742: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25742
*
CVE-2020-25743: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25743
*
CVE-2020-27661: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27661
*
CVE-2020-27749: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749
*
CVE-2020-27821: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27821
*
CVE-2020-29510: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29510
*
CVE-2020-29623: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623
*
CVE-2020-35503: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503
*
CVE-2020-35504: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35504
*
CVE-2020-35505: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35505
*
CVE-2020-35506: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35506
*
CVE-2020-3810: apt
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-3810
*
CVE-2021-1765: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765
*
CVE-2021-1789: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789
*
CVE-2021-1799: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799
*
CVE-2021-1801: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801
*
CVE-2021-1870: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870
*
CVE-2021-20225: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225
*
CVE-2021-20233: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233
*
CVE-2021-20255: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255
*
CVE-2021-20294: binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20294
*
CVE-2021-25219: bind
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25219
*
CVE-2021-27097: u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27097
*
CVE-2021-27138: u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27138
*
CVE-2021-27918: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27918
*
CVE-2021-28966: ruby:ruby-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28966
*
CVE-2021-31525: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31525
*
CVE-2021-31879: wget
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
*
CVE-2021-33194: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33194
*
CVE-2021-33195: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33195
*
CVE-2021-33198: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33198
*
CVE-2021-33833: connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33833
*
CVE-2021-3409: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3409
*
CVE-2021-3418: grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3418
*
CVE-2021-3445: libdnf
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445
*
CVE-2021-3472: xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3472
*
CVE-2021-3507: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507
*
CVE-2021-36221: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36221
*
CVE-2021-36976: libarchive:libarchive-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976
*
CVE-2021-3713: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713
*
CVE-2021-38297: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38297
*
CVE-2021-39293: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39293
*
CVE-2021-3974: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3974
*
CVE-2021-3984: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3984
*
CVE-2021-4008: xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4008
*
CVE-2021-4009: xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4009
*
CVE-2021-4010: xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4010
*
CVE-2021-4011: xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4011
*
CVE-2021-4019: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4019
*
CVE-2021-4136: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4136
*
CVE-2021-4145: qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4145
*
CVE-2021-4160: openssl:openssl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4160
*
CVE-2021-4166: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4166
*
CVE-2021-4173: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4173
*
CVE-2021-41771: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771
*
CVE-2021-41772: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772
*
CVE-2021-41817: ruby:ruby-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41817
*
CVE-2021-41819: ruby:ruby-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41819
*
CVE-2021-4187: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4187
*
CVE-2021-4192: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4192
*
CVE-2021-4193: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4193
*
CVE-2021-42762: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42762
*
CVE-2021-44716: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44716
*
CVE-2021-44717: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44717
*
CVE-2021-45078: binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45078
*
CVE-2021-45085: epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45085
*
CVE-2021-45086: epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45086
*
CVE-2021-45087: epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45087
*
CVE-2021-45088: epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45088
*
CVE-2021-45481: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45481
*
CVE-2021-45482: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45482
*
CVE-2021-45483: webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45483
*
CVE-2021-45944: ghostscript:ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45944
*
CVE-2021-45949: ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45949
*
CVE-2022-0128: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0128
*
CVE-2022-0156: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0156
*
CVE-2022-0158: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0158
*
CVE-2022-0261: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0261
*
CVE-2022-0318: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0318
*
CVE-2022-0319: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0319
*
CVE-2022-0359: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0359
*
CVE-2022-0361: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0361
*
CVE-2022-0368: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0368
*
CVE-2022-0392: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0392
*
CVE-2022-0393: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0393
*
CVE-2022-0407: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0407
*
CVE-2022-0408: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0408
*
CVE-2022-0413: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0413
*
CVE-2022-0417: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0417
*
CVE-2022-0443: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0443
*
CVE-2022-0529: unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0529
*
CVE-2022-0530: unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530
*
CVE-2022-0554: vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0554
*
CVE-2022-0561: tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0561
*
CVE-2022-0562: tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0562
*
CVE-2022-22707: lighttpd
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22707
*
CVE-2022-23096: connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23096
*
CVE-2022-23097: connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23097
*
CVE-2022-23098: connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23098
*
CVE-2022-23303: wpa-supplicant
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23303
*
CVE-2022-23304: wpa-supplicant
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23304
*
CVE-2022-23772: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23772
*
CVE-2022-23773: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23773
*
CVE-2022-23806: go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23806
*
CVE-2022-23990: expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23990
*
More
All Messages By This Member
previous page
#161984
next page
Join
openembedded-core@lists.openembedded.org to automatically receive all group messages.
×
Close
Report Message
Reason
Report to Moderators
I think this message isn't appropriate for our group. The Group moderators are responsible for maintaining their community and can address these issues.
Report to Open Embedded Support
I think this violates the Terms of Service. This includes: harm to minors, violence or threats, harassment or privacy invasion, impersonation or misrepresentation, fraud or phishing.
Note:
Your email address is included with the abuse report.
×
Close
Verify Delete
Are you sure you wish to delete this message from the message archives of openembedded-core@lists.openembedded.org?
This cannot be undone.
×
Close
Verify Repost
Are you sure you wish to repost this message?
More Options
More
Home
Hashtags
Subgroups
Terms
Toggle navigation
Terms
©
2023
Groups.io