CVE coverage

Ubuntu 22.04 LTS CVE tracker

Noxen pulls Ubuntu 22.04 CVE data from OSV.dev's Ubuntu ecosystem feed — the same source Canonical itself publishes through their security tracker. Records are deduped against NVD/VulnCheck and shipped in a signed snapshot, daily. Pro/ESM-tagged fixes are kept distinct so you can see whether a patch requires a paid subscription before clicking through.

Live

Headline numbers

  • Total CVE records (all distros)Loading…
  • Last buildLoading…
  • OSV records (Ubuntu + others)Loading…
  • NVD records (cross-platform)Loading…

How matching works

What Noxen does for an Ubuntu 22.04 host

  1. Reads /etc/os-release over SSH to confirm the host is on Ubuntu 22.04.
  2. Reads the dpkg package list — every binary package, plus its corresponding source package via dpkg-query --showformat='${Source}'.
  3. Filters the local feed cache to OSV records tagged with ecosystem Ubuntu:22.04:LTS.
  4. For each record, compares your installed version against the OSV-published fix version using the Debian/Ubuntu version-comparison rules (epoch, upstream, debian-revision).
  5. Emits a finding only when the installed version is older than the fix. Where Ubuntu Pro / ESM-only fixes apply, they are flagged separately.

Live listings

Top recent critical CVEs (Ubuntu 22.04 / Ubuntu ecosystem)

Most-recently-published critical CVEs in the Ubuntu 22.04 / Ubuntu ecosystem. Auto-deduped to one row per CVE ID. Snapshot baked at ; live re-fetch on page load.

CVESev.CVSSSummaryPackageFix inPublished
UBUNTU-CVE-2024-40896critical9.1In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attlibxml22.12.7+dfsg-3ubuntu0.1
UBUNTU-CVE-2024-9486critical9.8A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default ckubernetes
UBUNTU-CVE-2024-6385critical9.8An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user ugitlab
UBUNTU-CVE-2024-38998critical9.8Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.requirejs
UBUNTU-CVE-2024-35325critical9.8A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free.libyaml
UBUNTU-CVE-2024-35326critical9.8libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free.libyaml
UBUNTU-CVE-2024-35863criticalIn the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.linux-hwe-edge
UBUNTU-CVE-2024-3094criticalMalicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the sourcexz-utils5.2.4-1ubuntu1.1

Top recent high-severity CVEs (Ubuntu 22.04 / Ubuntu ecosystem)

CVESev.CVSSSummaryPackageFix inPublished
UBUNTU-CVE-2026-43284highIn the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skblinux
UBUNTU-CVE-2026-43500highrxrpc: Also unshare DATA/RESPONSE packets when paged frags are presentlinux
UBUNTU-CVE-2026-23918highhttp2: double free and possible RCE on early resetapache22.4.66-2ubuntu2.1
UBUNTU-CVE-2026-31431highIn the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operatinlinux-azure
UBUNTU-CVE-2026-41651highsecurity updatepackagekit0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1
UBUNTU-CVE-2026-34197highImproper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. activemq
UBUNTU-CVE-2026-35535highIn Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.sudo1.9.9-1ubuntu2.6
UBUNTU-CVE-2026-23410highIn the Linux kernel, the following vulnerability has been resolved: apparmor: fix race on rawdata dereference There is a race condition that leads to a use-after-free situation: because the rawdata inodes are not refcounted, an attacker canlinux-azure

New to severity terminology? CVE, CVSS, CWE, CPE explained.

Notable

Recent CVEs Ubuntu 22.04 operators should know.

Scan an Ubuntu 22.04 fleet with Noxen

Add your Ubuntu 22.04 hosts via your existing ~/.ssh/config; Noxen reads dpkg state and matches against the live signed feed. No agent, no SaaS round-trip. $79 one-time.

← back to the CVE dashboard   Ubuntu 24.04 →   Debian 13 →