You may have noticed that these reports weren't sent on the normal schedule.
This is due to repeated failures in updating the database: WARNING: cve-update-nvd2-native-1.0-r0 do_fetch: CVE database update failed I tried many times yesterday, but was largely unsuccessful. I was able to get nanbield and master to complete, but in both cases it took longer than two hours for the database to update! Every other attempt also had extremely slow updates and then would fail an hour or so into the process. Is anyone else experiencing this issue? Steve On Sun, Nov 26, 2023 at 7:01 AM <[email protected]> wrote: > > Branch: nanbield > > New this week: 8 CVEs > CVE-2023-48231 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48231 * > CVE-2023-48232 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48232 * > CVE-2023-48233 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48233 * > CVE-2023-48234 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48234 * > CVE-2023-48235 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48235 * > CVE-2023-48236 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48236 * > CVE-2023-48237 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48237 * > CVE-2023-6176 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6176 * > > Removed this week: 3 CVEs > CVE-2022-33065 (CVSS3: 7.8 HIGH): libsndfile1 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33065 * > CVE-2023-46246 (CVSS3: 5.5 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46246 * > CVE-2023-5363 (CVSS3: 7.5 HIGH): openssl:openssl-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5363 * > > Full list: Found 63 unpatched CVEs > CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 * > CVE-2021-3714 (CVSS3: 7.5 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 * > CVE-2021-3864 (CVSS3: 7.0 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 * > CVE-2022-0400 (CVSS3: 7.5 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 * > CVE-2022-1247 (CVSS3: 7.0 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 * > CVE-2022-3219 (CVSS3: 3.3 LOW): gnupg:gnupg-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 * > CVE-2022-36402 (CVSS3: 5.5 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 * > CVE-2022-38096 (CVSS3: 5.5 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 * > CVE-2022-4543 (CVSS3: 5.5 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 * > CVE-2022-46456 (CVSS3: 6.1 MEDIUM): nasm:nasm-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 * > CVE-2023-0687 (CVSS3: 9.8 CRITICAL): glibc > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 * > CVE-2023-1386 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 * > CVE-2023-25584 (CVSS3: 7.1 HIGH): > binutils:binutils-cross-testsuite:binutils-cross-x86_64:binutils-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 * > CVE-2023-3019 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 * > CVE-2023-3397 (CVSS3: 6.3 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397 * > CVE-2023-3640 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 * > CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 * > CVE-2023-38470 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470 * > CVE-2023-38471 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471 * > CVE-2023-38472 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472 * > CVE-2023-38473 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473 * > CVE-2023-38559 (CVSS3: 5.5 MEDIUM): ghostscript > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 * > CVE-2023-39189 (CVSS3: 6.0 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39189 * > CVE-2023-39192 (CVSS3: 6.0 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39192 * > CVE-2023-39193 (CVSS3: 6.0 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39193 * > CVE-2023-39928 (CVSS3: 8.8 HIGH): webkitgtk > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39928 * > CVE-2023-40030 (CVSS3: 6.1 MEDIUM): rust:rust-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40030 * > CVE-2023-4010 (CVSS3: 4.6 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 * > CVE-2023-4039 (CVSS3: 4.8 MEDIUM): > gcc:gcc-cross-x86_64:gcc-runtime:gcc-sanitizers:libgcc:libgcc-initial > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4039 * > CVE-2023-42752 (CVSS3: 5.5 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42752 * > CVE-2023-42753 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42753 * > CVE-2023-42754 (CVSS3: 5.5 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42754 * > CVE-2023-42756 (CVSS3: 4.7 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42756 * > CVE-2023-45283 (CVSS3: 7.5 HIGH): > go:go-binary-native:go-cross-core2-64:go-runtime > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45283 * > CVE-2023-45284 (CVSS3: 5.3 MEDIUM): > go:go-binary-native:go-cross-core2-64:go-runtime > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45284 * > CVE-2023-45803 (CVSS3: 4.2 MEDIUM): python3-urllib3 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45803 * > CVE-2023-4623 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4623 * > CVE-2023-46407 (CVSS3: 5.5 MEDIUM): ffmpeg > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46407 * > CVE-2023-46813 (CVSS3: 7.0 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46813 * > CVE-2023-46862 (CVSS3: 4.7 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46862 * > CVE-2023-4692 (CVSS3: 7.8 HIGH): grub:grub-efi:grub-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 * > CVE-2023-4693 (CVSS3: 4.6 MEDIUM): grub:grub-efi:grub-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 * > CVE-2023-47233 (CVSS3: 4.3 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47233 * > CVE-2023-48231 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48231 * > CVE-2023-48232 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48232 * > CVE-2023-48233 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48233 * > CVE-2023-48234 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48234 * > CVE-2023-48235 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48235 * > CVE-2023-48236 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48236 * > CVE-2023-48237 (CVSS3: 4.3 MEDIUM): vim > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48237 * > CVE-2023-4921 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4921 * > CVE-2023-5088 (CVSS3: 7.0 HIGH): qemu:qemu-native:qemu-system-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 * > CVE-2023-5156 (CVSS3: 7.5 HIGH): glibc > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5156 * > CVE-2023-5178 (CVSS3: 8.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5178 * > CVE-2023-5197 (CVSS3: 6.6 MEDIUM): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5197 * > CVE-2023-5345 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5345 * > CVE-2023-5367 (CVSS3: 7.8 HIGH): xserver-xorg:xwayland > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5367 * > CVE-2023-5380 (CVSS3: 4.7 MEDIUM): xserver-xorg:xwayland > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5380 * > CVE-2023-5574 (CVSS3: 7.0 HIGH): xserver-xorg:xwayland > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5574 * > CVE-2023-5633 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5633 * > CVE-2023-5678 (CVSS3: 5.3 MEDIUM): openssl:openssl-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5678 * > CVE-2023-5717 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5717 * > CVE-2023-6176 (CVSS3: 7.8 HIGH): linux-yocto > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6176 * > > For further information see: > https://autobuilder.yocto.io/pub/non-release/patchmetrics/
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#191304): https://lists.openembedded.org/g/openembedded-core/message/191304 Mute This Topic: https://lists.openembedded.org/mt/102813683/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
