Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%

Canonical — Vulnerabilities & Security Advisories 106

Browse all 106 CVE security advisories affecting Canonical. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPaused
CVE-2025-53513 Zip slip vulnerability in Juju — JujuCWE-24 8.8 High2025-07-08
CVE-2025-53512 Sensitive log retrieval in Juju — JujuCWE-200 6.5 Medium2025-07-08
CVE-2025-6224 Key leakage in juju/utils certificates — Juju utilsCWE-312 6.5 Medium2025-07-01
CVE-2024-11584 cloud-init 安全漏洞 — cloud-init 5.9 Medium2025-06-26
CVE-2024-6174 cloud-init 安全漏洞 — cloud-init 8.8 High2025-06-26
CVE-2025-5689 Improper Permission Management in SSH Session Handling — authd 8.5 High2025-06-16
CVE-2025-5054 Race Condition in Canonical Apport — ApportCWE-362 4.7 Medium2025-05-30
CVE-2025-24375 MySQL K8s charm could leak credentials for root-level user `serverconfig` — mysql-k8s-operatorCWE-256 5.0 Medium2025-04-09
CVE-2025-31479 canonical/get-workflow-version-action can leak a partial GITHUB_TOKEN in exception output — get-workflow-version-actionCWE-532 8.2 High2025-04-02
CVE-2024-29069 snapd will follow archived symlinks when unpacking a filesystem — snapdCWE-610 4.8 Medium2024-07-25
CVE-2024-29068 snapd non-regular file indefinite blocking read — snapdCWE-20 5.8 Medium2024-07-25
CVE-2024-1724 snapd allows $HOME/bin symlink — snapCWE-732 6.3 Medium2024-07-25
CVE-2024-41129 The ops library leaks secrets if `subprocess.CalledProcessError` happens with a `secret-*` CLI command — operatorCWE-532 4.4 Medium2024-07-22
CVE-2023-5536 LXD 安全漏洞 — Ubuntu Server 5.0 Medium2023-12-12
CVE-2023-32629 Canonical Ubuntu 安全漏洞 — Ubuntu KernelCWE-863 7.8 High2023-07-26
CVE-2023-2640 Canonical Ubuntu Linux 安全漏洞 — Ubuntu KernelCWE-863 7.8 High2023-07-26
CVE-2021-3747 MacOS version of Multipass incorrect owner for application directory — MultipassCWE-732 8.8 High2021-10-01
CVE-2021-3710 Apport info disclosure via path traversal bug in read_file — apportCWE-24 6.5 Medium2021-10-01
CVE-2021-3709 Apport file permission bypass through emacs byte compilation errors — apportCWE-538 6.5 Medium2021-10-01
CVE-2021-3626 Windows version of Multipass unauthenticated localhost tcp control socket can perform mounts — MultipassCWE-73 8.8 High2021-10-01
CVE-2021-32556 apport get_modified_conffiles() function command injection — apportCWE-78 3.8 Low2021-06-12
CVE-2021-32557 apport process_report() arbitrary file write — apportCWE-59 5.2 Medium2021-06-12
CVE-2021-32555 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32553 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32554 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32552 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32550 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32551 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32549 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12
CVE-2021-32548 apport read_file() function could follow maliciously constructed symbolic links — apportCWE-59 7.3 High2021-06-12

This page lists every published CVE security advisory associated with Canonical. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.