Canonical Security Vulnerabilities (CVEs)

Track 83 security vulnerabilities affecting Canonical products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

10 Critical
55 High
17 Medium
1 Low
🔔 Get Alerts for Canonical
CVE-2023-1380 7.1

This CVE describes an out-of-bounds read vulnerability in the Broadcom brcmfmac WiFi driver in the Linux kernel. When processing association request d...

Mar 27, 2023
CVE-2023-0386 7.8

This Linux kernel vulnerability allows local users to escalate privileges by exploiting a uid mapping bug in OverlayFS when copying capable files betw...

Mar 22, 2023
CVE-2022-29581 7.8

A local privilege escalation vulnerability in the Linux kernel's net/sched subsystem allows attackers with local access to gain root privileges. This ...

May 17, 2022
CVE-2022-1055 7.8

CVE-2022-1055 is a use-after-free vulnerability in the Linux kernel's tc_new_tfilter function that allows local attackers to escalate privileges. The ...

Mar 29, 2022
CVE-2021-3640 7.0

This CVE describes a use-after-free vulnerability in the Linux kernel's Bluetooth HCI subsystem. A privileged local attacker can trigger a race condit...

Mar 3, 2022
CVE-2022-0492 7.8

CVE-2022-0492 is a Linux kernel vulnerability in the cgroups v1 release_agent feature that allows local attackers to escalate privileges and escape co...

Mar 3, 2022
CVE-2020-25717 8.1

CVE-2020-25717 is a privilege escalation vulnerability in Samba's domain user mapping mechanism. Authenticated attackers can exploit this flaw to gain...

Feb 18, 2022
CVE-2020-25719 7.2

This vulnerability in Samba's Active Directory Domain Controller allows attackers to bypass Kerberos authentication by exploiting confusion about user...

Feb 18, 2022
CVE-2021-44730 7.8

CVE-2021-44730 is a privilege escalation vulnerability in snapd where improper validation of the snap-confine binary location allows local attackers t...

Feb 17, 2022
CVE-2021-4120 8.2

This vulnerability in snapd allows malicious snaps to bypass strict confinement by injecting arbitrary AppArmor policy rules through malformed content...

Feb 17, 2022
CVE-2021-3560 7.8

CVE-2021-3560 is a privilege escalation vulnerability in polkit's D-Bus authentication mechanism that allows unprivileged local users to bypass creden...

Feb 16, 2022
CVE-2021-45079 9.1

This vulnerability in strongSwan allows a malicious VPN responder to bypass authentication by sending an EAP-Success message prematurely. Attackers ca...

Jan 31, 2022
CVE-2021-4034 7.8

CVE-2021-4034 (PwnKit) is a local privilege escalation vulnerability in polkit's pkexec utility that allows unprivileged local users to gain root priv...

Jan 28, 2022
CVE-2021-45417 7.8

CVE-2021-45417 is a heap-based buffer overflow vulnerability in AIDE (Advanced Intrusion Detection Environment) that allows local users to escalate pr...

Jan 20, 2022
CVE-2022-20698 7.5

This vulnerability in ClamAV's OOXML parsing module allows remote attackers to crash the antivirus scanning process by sending specially crafted OOXML...

Jan 14, 2022
CVE-2021-44420 7.3

This Django vulnerability allows attackers to bypass URL-based access controls by appending trailing newlines to HTTP request URLs. Attackers could ac...

Dec 8, 2021
CVE-2021-3939 7.8

This CVE describes a double-free memory corruption vulnerability in Ubuntu's accountsservice. Attackers can exploit this via the SetLanguage D-Bus fun...

Nov 17, 2021
CVE-2021-3747 8.8

This vulnerability in Multipass for macOS allows local privilege escalation due to incorrect directory ownership. An attacker with local access can mo...

Oct 1, 2021
CVE-2021-3626 8.8

This vulnerability in Multipass for Windows allows any local process to connect to the control socket and mount host directories into guest VMs, enabl...

Oct 1, 2021
CVE-2021-32553 7.3

This vulnerability in Apport's read_file() function allows local attackers to read arbitrary files by exploiting symbolic links or FIFOs. When used by...

Jun 12, 2021
CVE-2021-32555 7.3

CVE-2021-32555 is a path traversal vulnerability in Apport's read_file() function that follows symbolic links and opens FIFOs, potentially exposing se...

Jun 12, 2021
CVE-2021-32549 7.3

This vulnerability in Apport's read_file() function allows local attackers to read arbitrary files by exploiting symbolic links or FIFOs. It affects U...

Jun 12, 2021
CVE-2021-32551 7.3

This vulnerability in Apport's read_file() function allows local attackers to read arbitrary files by exploiting symbolic links or FIFOs. It affects U...

Jun 12, 2021
CVE-2021-32547 7.3

This vulnerability in Apport's read_file() function allows local attackers to read arbitrary files via symbolic link or FIFO manipulation. When exploi...

Jun 12, 2021
CVE-2021-25682 8.8

CVE-2021-25682 is a vulnerability in Apport's get_pid_info() function that improperly parses /proc/pid/status files, potentially allowing local privil...

Jun 11, 2021
CVE-2021-25684 8.8

CVE-2021-25684 is a vulnerability in Ubuntu's Apport crash reporting system where improper handling of FIFO (named pipe) files could allow local attac...

Jun 11, 2021
CVE-2021-3490 7.8

This CVE-2021-3490 is a Linux kernel vulnerability in eBPF's ALU32 bounds tracking for bitwise operations (AND, OR, XOR). It allows local attackers to...

Jun 4, 2021
CVE-2021-3492 8.8

CVE-2021-3492 is a kernel vulnerability in Ubuntu's Shiftfs filesystem where improper error handling during copy_from_user() operations can cause memo...

Apr 17, 2021
CVE-2021-27364 7.1

CVE-2021-27364 is a Linux kernel vulnerability in the iSCSI subsystem that allows unprivileged local users to cause a denial of service or potentially...

Mar 7, 2021
CVE-2020-15708 9.3

Ubuntu 20.04 LTS's libvirt package created a control socket with overly permissive world read/write permissions. This allows local attackers to overwr...

Nov 6, 2020
CVE-2020-28039 9.1

This vulnerability in WordPress allows authenticated users with author-level permissions to delete arbitrary files on the server due to improper valid...

Nov 2, 2020
CVE-2020-24379 9.8

This vulnerability allows attackers to perform XML External Entity (XXE) injection attacks through the WebDAV implementation in Yaws web server. Attac...

Sep 9, 2020
CVE-2020-1472 5.5

CVE-2020-1472 (Zerologon) is a critical authentication bypass vulnerability in Microsoft's Netlogon protocol that allows unauthenticated attackers to ...

Aug 17, 2020

Why Monitor Canonical Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 83+ known vulnerabilities affecting Canonical products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Canonical packages in under 60 seconds. No agents required - completely agentless scanning that works across Canonical deployments.

Free vulnerability database: Access detailed information about every Canonical CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Canonical CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Canonical CVEs Free