CVE reports
The Common Vulnerabilities and Exposures (CVE) system is used to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. Canonical keeps track of all CVEs affecting Ubuntu, and releases a security notice when an issue is fixed.
Canonical also produces Open Vulnerability and Assessment Language (OVAL) data, which is machine-readable, to enable auditing for CVEs and to determine whether a particular patch, via an Ubuntu Security Notice (USN), is appropriate for the local system.
Search
Recent CVEs affecting Ubuntu
ID | Priority | Package |
14.04 ESM
|
16.04 ESM
|
18.04 LTS
|
20.04 LTS
|
22.04 LTS
|
22.10
|
---|---|---|---|---|---|---|---|---|
CVE-2023-22799 |
medium
|
ruby-globalid |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2023-22797 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2023-22796 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2023-22795 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2023-22794 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2023-22792 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2023-0512 |
low
|
vim |
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2023-0474 |
medium
|
chromium-browser |
Ignored
|
Ignored
|
Needed
|
Not vulnerable
|
Not vulnerable
|
Not vulnerable
|
CVE-2023-0473 |
medium
|
chromium-browser |
Ignored
|
Ignored
|
Needed
|
Not vulnerable
|
Not vulnerable
|
Not vulnerable
|
CVE-2023-0472 |
medium
|
chromium-browser |
Ignored
|
Ignored
|
Needed
|
Not vulnerable
|
Not vulnerable
|
Not vulnerable
|
CVE-2023-0341 |
medium
|
editorconfig-core |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2022-4884 |
low
|
check-mk |
Ignored
|
Needs triage
|
Needs triage
|
Does not exist
|
Does not exist
|
Does not exist
|
CVE-2022-48285 |
medium
|
node-jszip |
Ignored
|
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2022-44572 |
medium
|
ruby-rack |
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2022-44571 |
medium
|
ruby-rack |
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2022-44570 |
medium
|
ruby-rack |
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
CVE-2022-44566 |
medium
|
rails |
Ignored
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
Needs triage
|
ruby-rails-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-actionpack-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activesupport-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activerecord-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
ruby-activemodel-3.2 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
rails-4.0 |
Ignored
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
||
CVE-2022-4335 |
low
|
gitlab |
Ignored
|
Not vulnerable
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
CVE-2022-4255 |
low
|
gitlab |
Ignored
|
Not vulnerable
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|
CVE-2022-39324 |
medium
|
grafana |
Ignored
|
Needs triage
|
Does not exist
|
Does not exist
|
Does not exist
|
Does not exist
|