Known Vulnerabilities for products from Canonical
Listed below are 20 of the newest known vulnerabilities associated with the vendor "Canonical".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
CVE | Shortened Description | Severity | Publish Date | Last Modified |
---|---|---|---|---|
CVE-2023-2650 | Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact s... | 7.5 - HIGH | 2023-05-30 | 2023-06-09 |
CVE-2022-43939 | Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security rest... | 9.8 - CRITICAL | 2023-04-03 | 2023-05-11 |
CVE-2022-24760 | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... | 10 - CRITICAL | 2022-03-12 | 2022-07-01 |
CVE-2022-23238 | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... | 6.5 - MEDIUM | 2022-08-10 | 2022-08-15 |
CVE-2022-23220 | USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certa... | 7.8 - HIGH | 2022-01-21 | 2022-01-27 |
CVE-2022-20698 | A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and p... | 7.5 - HIGH | 2022-01-14 | 2022-01-21 |
CVE-2022-0492 | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... | 7.8 - HIGH | 2022-03-03 | 2023-05-12 |
CVE-2022-0319 | Out-of-bounds Read in vim/vim prior to 8.2. | 5.5 - MEDIUM | 2022-01-21 | 2022-11-09 |
CVE-2021-32557 | It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks. | 7.1 - HIGH | 2021-06-12 | 2021-06-23 |
CVE-2021-32556 | It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified pac... | 3.3 - LOW | 2021-06-12 | 2021-06-23 |
CVE-2021-32555 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-16 |
CVE-2021-32554 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-16 |
CVE-2021-32553 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-16 |
CVE-2021-32552 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-32551 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-32550 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-32549 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-32548 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-32547 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is us... | 5.5 - MEDIUM | 2021-06-12 | 2021-06-15 |
CVE-2021-28374 | The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon direc... | 7.5 - HIGH | 2021-03-15 | 2022-06-28 |
Known software with vulnerabilities from Canonical
Type | Vendor | Product | Version |
---|---|---|---|
Application | Canonical | Accountsservice | 0.6.14 |
Application | Canonical | Acpi-support | 0.141 |
Application | Canonical | Add-apt-repository | 0.92.37.0 |
Application | Canonical | Apparmor | - |
Application | Canonical | Apport | 2.19.1-0ubuntu3 |
Application | Canonical | Apt-xapian-index | 0.4 |
Application | Canonical | Bazaar | 2.7.0 |
Application | Canonical | Checkinstall | 1.6.2 |
Application | Canonical | C-kernel | 2019-07-16 |
Application | Canonical | Cloud-init | 0.5.0 |
Application | Canonical | Juju | 1.25.5 |
Application | Canonical | Libpam-modules | 0.9.7 |
Application | Canonical | Ltsp Display Manager | 2.2.4 |
Application | Canonical | Lxcfs | 0.11 |
Application | Canonical | Metal As A Service | 1.9.0 |
Application | Canonical | Microk8s | 1.11 |
Application | Canonical | Php5 | 5.3.2-1ubuntu4.16 |
Application | Canonical | Ppp | 2.4.2\+20040428-2ubuntu6 |
Application | Canonical | Reportbug | 6.5.0 |
Application | Canonical | Screen-resolution-extra | 0.17.2 |
Popular searches for "Canonical"
ca·non·i·cal | kəˈnänək(ə)l | adjective
canonical $ | knnk l | adjective '1. according to or ordered by canon law M I2. included in the list of sacred books officially accepted as genuine New Oxford American Dictionary Dictionary

Canonical Group Limited
Canonical Group Limited Canonical Ltd. is a UK-based privately held computer software company founded and funded by South African entrepreneur Mark Shuttleworth to market commercial support and related services for Ubuntu and related projects. Canonical employs staff in more than 30 countries and maintains offices in London, Austin, Boston, Shanghai, Beijing, Taipei, Tokyo and the Isle of Man. Wikipedia