Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

canonical — Vulnerabilities & Security Advisories 107

Browse all 107 CVE security advisories affecting canonical. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Canonical Ltd. primarily develops and maintains Ubuntu, a widely deployed Linux distribution, alongside the OpenStack cloud infrastructure platform and the Snap package management system. Security audits reveal a significant volume of recorded vulnerabilities, currently totaling 107 CVEs, reflecting the extensive codebase and third-party dependencies inherent in these large-scale software ecosystems. Historically, the most prevalent vulnerability classes include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws, often stemming from improper input validation or insecure default configurations within associated services. While no single catastrophic incident has defined the company’s security history, the sheer number of disclosed issues highlights the challenges of maintaining rigorous patch cycles across diverse components. These findings underscore the necessity for continuous monitoring and timely updates for organizations relying on Canonical’s open-source technologies to mitigate potential exploitation risks.

CVE IDTitleCVSSSeverityPublished
CVE-2025-0928 Arbitrary executable upload via authenticated endpoint — JujuCWE-285 8.8 High2025-07-08
CVE-2025-53513 Zip slip vulnerability in Juju — JujuCWE-24 8.8 High2025-07-08
CVE-2025-53512 Sensitive log retrieval in Juju — JujuCWE-200 6.5 Medium2025-07-08
CVE-2025-6224 Key leakage in juju/utils certificates — Juju utilsCWE-312 6.5 Medium2025-07-01
CVE-2024-11584 cloud-init 安全漏洞 — cloud-init 5.9 Medium2025-06-26
CVE-2024-6174 cloud-init 安全漏洞 — cloud-init 8.8 High2025-06-26
CVE-2025-5689 Improper Permission Management in SSH Session Handling — authd 8.5 High2025-06-16
CVE-2025-5054 Race Condition in Canonical Apport — ApportCWE-362 4.7 Medium2025-05-30
CVE-2025-24375 MySQL K8s charm could leak credentials for root-level user `serverconfig` — mysql-k8s-operatorCWE-256 5.0 Medium2025-04-09
CVE-2025-31479 canonical/get-workflow-version-action can leak a partial GITHUB_TOKEN in exception output — get-workflow-version-actionCWE-532 8.2 High2025-04-02
CVE-2024-29069 snapd will follow archived symlinks when unpacking a filesystem — snapdCWE-610 4.8 Medium2024-07-25
CVE-2024-29068 snapd non-regular file indefinite blocking read — snapdCWE-20 5.8 Medium2024-07-25
CVE-2024-1724 snapd allows $HOME/bin symlink — snapCWE-732 6.3 Medium2024-07-25
CVE-2024-41129 The ops library leaks secrets if `subprocess.CalledProcessError` happens with a `secret-*` CLI command — operatorCWE-532 4.4 Medium2024-07-22
CVE-2023-5536 LXD 安全漏洞 — Ubuntu Server 5.0 Medium2023-12-12
CVE-2023-32629 Canonical Ubuntu 安全漏洞 — Ubuntu KernelCWE-863 7.8 High2023-07-26
CVE-2023-2640 Canonical Ubuntu Linux 安全漏洞 — Ubuntu KernelCWE-863 7.8 High2023-07-26
CVE-2021-3747 MacOS version of Multipass incorrect owner for application directory — MultipassCWE-732 8.8 High2021-10-01
CVE-2021-3710 Apport info disclosure via path traversal bug in read_file — apportCWE-24 6.5 Medium2021-10-01
CVE-2021-3709 Apport file permission bypass through emacs byte compilation errors — apportCWE-538 6.5 Medium2021-10-01
CVE-2021-3626 Windows version of Multipass unauthenticated localhost tcp control socket can perform mounts — MultipassCWE-73 8.8 High2021-10-01
CVE-2021-32556 apport get_modified_conffiles() function command injection — apportCWE-78 3.8 Low2021-06-12
CVE-2021-32557 apport process_report() arbitrary file write — apportCWE-59 5.2 Medium2021-06-12
CVE-2021-32555 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32553 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32554 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32552 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32550 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32551 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32549 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12

This page lists every published CVE security advisory associated with canonical. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.