You may have noticed that these reports weren't sent on the normal schedule.

This is due to repeated failures in updating the database:

WARNING: cve-update-nvd2-native-1.0-r0 do_fetch: CVE database update failed

I tried many times yesterday, but was largely unsuccessful. I was able
to get nanbield and master to complete, but in both cases it took
longer than two hours for the database to update! Every other attempt
also had extremely slow updates and then would fail an hour or so into
the process.

Is anyone else experiencing this issue?

Steve

On Sun, Nov 26, 2023 at 7:01 AM <[email protected]> wrote:
>
> Branch: nanbield
>
> New this week: 8 CVEs
> CVE-2023-48231 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48231 *
> CVE-2023-48232 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48232 *
> CVE-2023-48233 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48233 *
> CVE-2023-48234 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48234 *
> CVE-2023-48235 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48235 *
> CVE-2023-48236 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48236 *
> CVE-2023-48237 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48237 *
> CVE-2023-6176 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6176 *
>
> Removed this week: 3 CVEs
> CVE-2022-33065 (CVSS3: 7.8 HIGH): libsndfile1 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33065 *
> CVE-2023-46246 (CVSS3: 5.5 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46246 *
> CVE-2023-5363 (CVSS3: 7.5 HIGH): openssl:openssl-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5363 *
>
> Full list:  Found 63 unpatched CVEs
> CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 *
> CVE-2021-3714 (CVSS3: 7.5 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 *
> CVE-2021-3864 (CVSS3: 7.0 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 *
> CVE-2022-0400 (CVSS3: 7.5 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 *
> CVE-2022-1247 (CVSS3: 7.0 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 *
> CVE-2022-3219 (CVSS3: 3.3 LOW): gnupg:gnupg-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 *
> CVE-2022-36402 (CVSS3: 5.5 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 *
> CVE-2022-38096 (CVSS3: 5.5 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 *
> CVE-2022-4543 (CVSS3: 5.5 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 *
> CVE-2022-46456 (CVSS3: 6.1 MEDIUM): nasm:nasm-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 *
> CVE-2023-0687 (CVSS3: 9.8 CRITICAL): glibc 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 *
> CVE-2023-1386 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 *
> CVE-2023-25584 (CVSS3: 7.1 HIGH): 
> binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 *
> CVE-2023-3019 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 *
> CVE-2023-3397 (CVSS3: 6.3 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397 *
> CVE-2023-3640 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 *
> CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 *
> CVE-2023-38470 (CVSS3: 5.5 MEDIUM): avahi 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470 *
> CVE-2023-38471 (CVSS3: 5.5 MEDIUM): avahi 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471 *
> CVE-2023-38472 (CVSS3: 5.5 MEDIUM): avahi 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472 *
> CVE-2023-38473 (CVSS3: 5.5 MEDIUM): avahi 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473 *
> CVE-2023-38559 (CVSS3: 5.5 MEDIUM): ghostscript 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 *
> CVE-2023-39189 (CVSS3: 6.0 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39189 *
> CVE-2023-39192 (CVSS3: 6.0 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39192 *
> CVE-2023-39193 (CVSS3: 6.0 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39193 *
> CVE-2023-39928 (CVSS3: 8.8 HIGH): webkitgtk 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39928 *
> CVE-2023-40030 (CVSS3: 6.1 MEDIUM): rust:rust-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40030 *
> CVE-2023-4010 (CVSS3: 4.6 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 *
> CVE-2023-4039 (CVSS3: 4.8 MEDIUM): 
> gcc:gcc-cross-x86_64:gcc-runtime:gcc-sanitizers:libgcc:libgcc-initial 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4039 *
> CVE-2023-42752 (CVSS3: 5.5 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42752 *
> CVE-2023-42753 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42753 *
> CVE-2023-42754 (CVSS3: 5.5 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42754 *
> CVE-2023-42756 (CVSS3: 4.7 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42756 *
> CVE-2023-45283 (CVSS3: 7.5 HIGH): 
> go:go-binary-native:go-cross-core2-64:go-runtime 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45283 *
> CVE-2023-45284 (CVSS3: 5.3 MEDIUM): 
> go:go-binary-native:go-cross-core2-64:go-runtime 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45284 *
> CVE-2023-45803 (CVSS3: 4.2 MEDIUM): python3-urllib3 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45803 *
> CVE-2023-4623 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4623 *
> CVE-2023-46407 (CVSS3: 5.5 MEDIUM): ffmpeg 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46407 *
> CVE-2023-46813 (CVSS3: 7.0 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46813 *
> CVE-2023-46862 (CVSS3: 4.7 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46862 *
> CVE-2023-4692 (CVSS3: 7.8 HIGH): grub:grub-efi:grub-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 *
> CVE-2023-4693 (CVSS3: 4.6 MEDIUM): grub:grub-efi:grub-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 *
> CVE-2023-47233 (CVSS3: 4.3 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47233 *
> CVE-2023-48231 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48231 *
> CVE-2023-48232 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48232 *
> CVE-2023-48233 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48233 *
> CVE-2023-48234 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48234 *
> CVE-2023-48235 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48235 *
> CVE-2023-48236 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48236 *
> CVE-2023-48237 (CVSS3: 4.3 MEDIUM): vim 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48237 *
> CVE-2023-4921 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4921 *
> CVE-2023-5088 (CVSS3: 7.0 HIGH): qemu:qemu-native:qemu-system-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 *
> CVE-2023-5156 (CVSS3: 7.5 HIGH): glibc 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5156 *
> CVE-2023-5178 (CVSS3: 8.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5178 *
> CVE-2023-5197 (CVSS3: 6.6 MEDIUM): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5197 *
> CVE-2023-5345 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5345 *
> CVE-2023-5367 (CVSS3: 7.8 HIGH): xserver-xorg:xwayland 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5367 *
> CVE-2023-5380 (CVSS3: 4.7 MEDIUM): xserver-xorg:xwayland 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5380 *
> CVE-2023-5574 (CVSS3: 7.0 HIGH): xserver-xorg:xwayland 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5574 *
> CVE-2023-5633 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5633 *
> CVE-2023-5678 (CVSS3: 5.3 MEDIUM): openssl:openssl-native 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5678 *
> CVE-2023-5717 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5717 *
> CVE-2023-6176 (CVSS3: 7.8 HIGH): linux-yocto 
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6176 *
>
> For further information see: 
> https://autobuilder.yocto.io/pub/non-release/patchmetrics/
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#191304): 
https://lists.openembedded.org/g/openembedded-core/message/191304
Mute This Topic: https://lists.openembedded.org/mt/102813683/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to