Toggle navigation
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Help
Log In
Help
Log In
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Home
Messages
Hashtags
Subgroups
×
×
×
Close
Likes
openembedded-core@lists.openembedded.org
Messages
OE-core CVE metrics for hardknott on Sun 10 Apr 2022 03:00:01 AM HST
×
Close
Search
Single
Toggle Dropdown
Messages
Topics
Expanded
previous page
#164200
next page
OE-core CVE metrics for hardknott on Sun 10 Apr 2022 03:00:01 AM HST
Steve Sakoman
#164200
Branch: hardknott
New this week: 4 CVEs
CVE-2019-1010238 (CVSS3: 9.8 CRITICAL): pango:pango-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010238
*
CVE-2022-1050 (CVSS3: 8.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1050
*
CVE-2022-1154 (CVSS3: 9.8 CRITICAL): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1154
*
CVE-2022-1160 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1160
*
Removed this week: 16 CVEs
CVE-2018-25032 (CVSS3: 7.5 HIGH): zlib:zlib-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25032
*
CVE-2020-29623 (CVSS3: 3.3 LOW): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623
*
CVE-2021-1765 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765
*
CVE-2021-1789 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789
*
CVE-2021-1799 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799
*
CVE-2021-1801 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801
*
CVE-2021-1870 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870
*
CVE-2021-4160 (CVSS3: 5.9 MEDIUM): openssl:openssl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4160
*
CVE-2021-45085 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45085
*
CVE-2021-45086 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45086
*
CVE-2021-45087 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45087
*
CVE-2021-45088 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45088
*
CVE-2022-0778 (CVSS3: 7.5 HIGH): openssl:openssl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778
*
CVE-2022-22623 (CVSS3: N/A): curl:curl-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22623
*
CVE-2022-23308 (CVSS3: 7.5 HIGH): libxml2:libxml2-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23308
*
CVE-2022-24921 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24921
*
Full list: Found 54 unpatched CVEs
CVE-2013-0340 (CVSS3: N/A): expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0340
*
CVE-2016-20012 (CVSS3: 5.3 MEDIUM): openssh
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-20012
*
CVE-2019-1010238 (CVSS3: 9.8 CRITICAL): pango:pango-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010238
*
CVE-2019-12067 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067
*
CVE-2020-18974 (CVSS3: 3.3 LOW): nasm:nasm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974
*
CVE-2020-35503 (CVSS3: 6.0 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503
*
CVE-2021-20255 (CVSS3: 5.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255
*
CVE-2021-25220 (CVSS3: 8.6 HIGH): bind
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25220
*
CVE-2021-27645 (CVSS3: 2.5 LOW): glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27645
*
CVE-2021-31879 (CVSS3: 6.1 MEDIUM): wget
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
*
CVE-2021-33574 (CVSS3: 9.8 CRITICAL): glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33574
*
CVE-2021-33833 (CVSS3: 9.8 CRITICAL): connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33833
*
CVE-2021-33928 (CVSS3: 7.5 HIGH): libsolv
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33928
*
CVE-2021-33929 (CVSS3: 7.5 HIGH): libsolv
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33929
*
CVE-2021-33930 (CVSS3: 7.5 HIGH): libsolv
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33930
*
CVE-2021-33938 (CVSS3: 7.5 HIGH): libsolv
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33938
*
CVE-2021-3445 (CVSS3: 7.5 HIGH): libdnf
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445
*
CVE-2021-3507 (CVSS3: 6.1 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507
*
CVE-2021-36368 (CVSS3: 3.7 LOW): openssh
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36368
*
CVE-2021-3638 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3638
*
CVE-2021-38604 (CVSS3: 7.5 HIGH): glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38604
*
CVE-2021-3947 (CVSS3: 5.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3947
*
CVE-2021-42376 (CVSS3: 5.5 MEDIUM): busybox
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42376
*
CVE-2021-45481 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45481
*
CVE-2021-45482 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45482
*
CVE-2021-45483 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45483
*
CVE-2021-45944 (CVSS3: 5.5 MEDIUM): ghostscript:ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45944
*
CVE-2021-46705 (CVSS3: 5.5 MEDIUM): grub:grub-efi:grub-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46705
*
CVE-2022-0204 (CVSS3: 8.8 HIGH): bluez5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0204
*
CVE-2022-0396 (CVSS3: 5.3 MEDIUM): bind
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0396
*
CVE-2022-0529 (CVSS3: 7.8 HIGH): unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0529
*
CVE-2022-0530 (CVSS3: 7.8 HIGH): unzip:unzip-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530
*
CVE-2022-0561 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0561
*
CVE-2022-0562 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0562
*
CVE-2022-0563 (CVSS3: 5.5 MEDIUM): util-linux:util-linux-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0563
*
CVE-2022-0891 (CVSS3: 7.1 HIGH): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0891
*
CVE-2022-0943 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0943
*
CVE-2022-1050 (CVSS3: 8.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1050
*
CVE-2022-1154 (CVSS3: 9.8 CRITICAL): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1154
*
CVE-2022-1160 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1160
*
CVE-2022-23096 (CVSS3: 9.1 CRITICAL): connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23096
*
CVE-2022-23097 (CVSS3: 9.1 CRITICAL): connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23097
*
CVE-2022-23098 (CVSS3: 7.5 HIGH): connman
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23098
*
CVE-2022-23218 (CVSS3: 9.8 CRITICAL): glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23218
*
CVE-2022-23219 (CVSS3: 9.8 CRITICAL): glibc
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23219
*
CVE-2022-23303 (CVSS3: 9.8 CRITICAL): wpa-supplicant
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23303
*
CVE-2022-23304 (CVSS3: 9.8 CRITICAL): wpa-supplicant
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23304
*
CVE-2022-24975 (CVSS3: 7.5 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24975
*
CVE-2022-25313 (CVSS3: 6.5 MEDIUM): expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25313
*
CVE-2022-25314 (CVSS3: 7.5 HIGH): expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25314
*
CVE-2022-25315 (CVSS3: 9.8 CRITICAL): expat:expat-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25315
*
CVE-2022-26354 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26354
*
CVE-2022-26488 (CVSS3: 7.0 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26488
*
CVE-2022-27191 (CVSS3: 7.5 HIGH): go
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27191
*
More
All Messages By This Member
previous page
#164200
next page
Join
{openembedded-core@lists.openembedded.org to automatically receive all group messages.
×
Close
Report Message
Reason
Report to Moderators
I think this message isn't appropriate for our group. The Group moderators are responsible for maintaining their community and can address these issues.
Report to Open Embedded Support
I think this violates the Terms of Service. This includes: harm to minors, violence or threats, harassment or privacy invasion, impersonation or misrepresentation, fraud or phishing.
Note:
Your email address is included with the abuse report.
×
Close
Verify Delete
Are you sure you wish to delete this message from the message archives of openembedded-core@lists.openembedded.org?
This cannot be undone.
×
Close
Verify Repost
Are you sure you wish to repost this message?
More Options
More
Home
Hashtags
Subgroups
Terms
Toggle navigation
Terms
©
2023
Groups.io