Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Canonical — Vulnerabilities & Security Advisories 107

Browse all 107 CVE security advisories affecting Canonical. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Canonical Ltd. primarily develops and maintains Ubuntu, a widely deployed Linux distribution, alongside the OpenStack cloud infrastructure platform and the Snap package management system. Security audits reveal a significant volume of recorded vulnerabilities, currently totaling 107 CVEs, reflecting the extensive codebase and third-party dependencies inherent in these large-scale software ecosystems. Historically, the most prevalent vulnerability classes include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws, often stemming from improper input validation or insecure default configurations within associated services. While no single catastrophic incident has defined the company’s security history, the sheer number of disclosed issues highlights the challenges of maintaining rigorous patch cycles across diverse components. These findings underscore the necessity for continuous monitoring and timely updates for organizations relying on Canonical’s open-source technologies to mitigate potential exploitation risks.

CVE IDTitleCVSSSeverityPublished
CVE-2021-32548 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32547 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-25684 apport can be stalled by reading a FIFO — apportCWE-20 8.8 High2021-06-11
CVE-2021-25683 apport improperly parses /proc/pid/stat — apportCWE-20 8.8 High2021-06-11
CVE-2021-25682 apport improperly parses /proc/pid/status — apportCWE-20 8.8 High2021-06-11
CVE-2013-1055 Potential DoS through abuse of rate limit in libunity-webapps for Firefox — unity-firefox-extensionCWE-404 4.3 Medium2021-04-07
CVE-2013-1054 Possible remote DOS in WebApps — unity-firefox-extensionCWE-404 4.3 Medium2021-04-07
CVE-2020-16119 DCCP CCID structure use-after-free — Linux kernelCWE-416 6.3 Medium2021-01-14
CVE-2013-1053 Insecure crypto for storing passwords — remote-login-serviceCWE-261 5.5 Medium2021-01-13
CVE-2020-27351 Various memory and file descriptor leaks in apt-python — python-aptCWE-772 2.0 Low2020-12-10
CVE-2020-27350 apt integer wraparound — aptCWE-190 5.7 Medium2020-12-10
CVE-2020-16128 Aptdaemon error messages disclosed file existence to unprivileged users via dbus properties — aptdaemonCWE-209 3.8 Low2020-12-09
CVE-2020-27349 aptdaemon performed policykit permissions checks too late — aptdaemonCWE-862 7.1 -2020-12-09
CVE-2020-27348 snapcraft may build snaps with incorrect LD_LIBRARY_PATH — snapcraftCWE-427 6.8 Medium2020-12-04
CVE-2020-16123 Bypass of snapd pulseaudio restrictions — pulseaudioCWE-362 4.4 Medium2020-12-03
CVE-2012-0955 software-properties incorrectly validated TLS certificates — software-propertiesCWE-295 6.8 Medium2020-12-02
CVE-2020-15710 Potential double-free in pulseaudio — PulseAudioCWE-415 5.3 Medium2020-11-19
CVE-2020-15703 aptdaemon allows unprivileged users to test for the presence of local files via the transaction Locale property — aptdaemonCWE-22 4.0 Medium2020-10-31
CVE-2014-1420 Insecure temp file usage in Ubuntu UI toolkit — ubuntu-ui-toolkitCWE-59 3.8 Low2020-09-10
CVE-2020-15709 add-apt-repository print ASNI terminal codes — add-apt-repositoryCWE-20 5.5 -2020-09-05
CVE-2020-15704 pppd arbitrary file read information disclosure vulnerability — pppCWE-200 5.5 Medium2020-08-31
CVE-2020-15702 TOCTOU in apport — apportCWE-367 7.0 High2020-08-06
CVE-2020-11937 Resource exhaustion vulnerability in whoopsie — whoopsieCWE-400 5.5 Medium2020-08-06
CVE-2020-15701 Unhandled exception in apport — apportCWE-755 5.5 Medium2020-08-06
CVE-2020-11933 local snapd exploit through cloud-init — snapdCWE-264 7.3 High2020-07-29
CVE-2020-11934 Sandbox escape vulnerability via snapctl user-open (xdg-open) — snapd 5.9 Medium2020-07-29
CVE-2014-1422 Location service uses cached authorization even after revocation — trust-store (Ubuntu)CWE-275 5.0 Medium2020-07-22
CVE-2020-11931 Ubuntu modifications to pulseaudio to provide snap security enforcement could be unloaded — pulseaudioCWE-284 3.3 Low2020-05-15
CVE-2020-11932 Subiquity server installer logged LUKS full disk encryption password — SubiquityCWE-532 2.3 Low2020-05-13
CVE-2015-7946 MTP service exposed during emergency dialer — unity8 (Ubuntu)CWE-200 7.3 High2020-05-07

This page lists every published CVE security advisory associated with Canonical. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.