CVE coverage

Ubuntu 20.04 LTS CVE tracker

Noxen pulls Ubuntu 20.04 CVE data from OSV.dev's Ubuntu ecosystem feed. Focal is out of standard Canonical support since April 2025 — any new CVE fix lands in the Ubuntu Pro / ESM channel (Ubuntu:Pro:20.04:LTS), and Noxen surfaces those separately so you can see at a glance whether a host needs a Pro subscription to actually install the patch.

Live

Headline numbers

  • Total CVE records (all distros)Loading…
  • Last buildLoading…
  • OSV records (Ubuntu + others)Loading…
  • NVD records (cross-platform)Loading…

How matching works

What Noxen does for an Ubuntu 20.04 host

  1. Reads /etc/os-release over SSH to confirm the host is on Ubuntu 20.04.
  2. Reads the dpkg package list — every binary package, plus its corresponding source package via dpkg-query --showformat='${Source}'.
  3. Filters the local feed cache to OSV records tagged with ecosystem Ubuntu:20.04:LTS.
  4. For each record, compares your installed version against the OSV-published fix version using the Debian/Ubuntu version-comparison rules (epoch, upstream, debian-revision).
  5. Emits a finding only when the installed version is older than the fix. Where Ubuntu Pro / ESM-only fixes apply, they are flagged separately.

Live listings

Top recent critical CVEs (Ubuntu 20.04 / Ubuntu ecosystem)

Most-recently-published critical CVEs in the Ubuntu 20.04 / Ubuntu ecosystem. Auto-deduped to one row per CVE ID. Snapshot baked at ; live re-fetch on page load.

CVESev.CVSSSummaryPackageFix inPublished
UBUNTU-CVE-2024-40896critical9.1In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attlibxml22.12.7+dfsg-3ubuntu0.1
UBUNTU-CVE-2024-9486critical9.8A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default ckubernetes
UBUNTU-CVE-2024-6385critical9.8An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user ugitlab
UBUNTU-CVE-2024-38998critical9.8Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.requirejs
UBUNTU-CVE-2024-35325critical9.8A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free.libyaml
UBUNTU-CVE-2024-35326critical9.8libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free.libyaml
UBUNTU-CVE-2024-35863criticalIn the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.linux-hwe-edge
UBUNTU-CVE-2024-3094criticalMalicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the sourcexz-utils5.2.4-1ubuntu1.1

Top recent high-severity CVEs (Ubuntu 20.04 / Ubuntu ecosystem)

CVESev.CVSSSummaryPackageFix inPublished
UBUNTU-CVE-2026-42945highNGINX ngx_http_rewrite_module vulnerabilitynginx
UBUNTU-CVE-2026-46300highFragnesia linux kernel local privilege escalation issuelinux
UBUNTU-CVE-2026-45185highA remotely reachable Use-After-Free (UAF) vulnerability has been identified in Exim's BDAT (binary data transmission) body parsing path when using the GnuTLS backend. This vulnerability can lead to heap corruption and potential code executiexim4
UBUNTU-CVE-2026-43500highIn the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_responselinux
UBUNTU-CVE-2026-43284highIn the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skblinux
UBUNTU-CVE-2026-23918highDouble Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.apache22.4.66-2ubuntu2.1
UBUNTU-CVE-2026-41651highPackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-packagekit0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1
UBUNTU-CVE-2026-31431highIn the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operatinlinux-azure

New to severity terminology? CVE, CVSS, CWE, CPE explained.

Notable

Recent CVEs Ubuntu 20.04 operators should know — ESM matters here.

Scan an Ubuntu 20.04 fleet with Noxen

Add your Ubuntu 20.04 hosts via your existing ~/.ssh/config; Noxen reads dpkg state and matches against the live signed feed. No agent, no SaaS round-trip. $79 one-time.

← back to the CVE dashboard   Ubuntu 22.04 →   Debian 13 →