Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 18.04 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2022-28652
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 21.10
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
5.5
CVSSv3
CVE-2022-28654
is_closing_session() allows users to fill up apport.log
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 21.10
7.1
CVSSv3
CVE-2022-28655
is_closing_session() allows users to create arbitrary tcp dbus connections
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 21.10
5.5
CVSSv3
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 21.10
7.8
CVSSv3
CVE-2022-28657
Apport does not disable python crash handler before entering chroot
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 21.10
5.5
CVSSv3
CVE-2022-28658
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
Apport Project Apport
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 21.10
7.8
CVSSv3
CVE-2021-3600
It exists that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
Linux Linux Kernel 5.11
Linux Linux Kernel
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Fedoraproject Fedora 34
Redhat Enterprise Linux 8.0
7
CVSSv3
CVE-2022-3328
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Snapd
1 Github repository
7
CVSSv3
CVE-2022-2602
io_uring UAF, Unix SCM garbage collection
Linux Linux Kernel
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
2 Github repositories
7.8
CVSSv3
CVE-2022-2586
It exists that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
Linux Linux Kernel
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
4 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »