CVE coverage
Ubuntu 22.04 LTS CVE tracker
Noxen pulls Ubuntu 22.04 CVE data from OSV.dev's Ubuntu ecosystem feed — the same source Canonical itself publishes through their security tracker. Records are deduped against NVD/VulnCheck and shipped in a signed snapshot, daily. Pro/ESM-tagged fixes are kept distinct so you can see whether a patch requires a paid subscription before clicking through.
Live
Headline numbers
- Total CVE records (all distros)Loading…
- Last buildLoading…
- OSV records (Ubuntu + others)Loading…
- NVD records (cross-platform)Loading…
How matching works
What Noxen does for an Ubuntu 22.04 host
- Reads
/etc/os-releaseover SSH to confirm the host is on Ubuntu 22.04. - Reads the dpkg package list — every binary package, plus its corresponding source package via
dpkg-query --showformat='${Source}'. - Filters the local feed cache to OSV records tagged with ecosystem
Ubuntu:22.04:LTS. - For each record, compares your installed version against the OSV-published fix version using the Debian/Ubuntu version-comparison rules (epoch, upstream, debian-revision).
- Emits a finding only when the installed version is older than the fix. Where Ubuntu Pro / ESM-only fixes apply, they are flagged separately.
Live listings
Top recent critical CVEs (Ubuntu 22.04 / Ubuntu ecosystem)
Most-recently-published critical CVEs in the Ubuntu 22.04 / Ubuntu ecosystem. Auto-deduped to one row per CVE ID. Snapshot baked at ; live re-fetch on page load.
| CVE | Sev. | CVSS | Summary | Package | Fix in | Published |
|---|---|---|---|---|---|---|
| UBUNTU-CVE-2024-40896 | critical | 9.1 | In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE att | libxml2 | 2.12.7+dfsg-3ubuntu0.1 | |
| UBUNTU-CVE-2024-9486 | critical | 9.8 | A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default c | kubernetes | — | |
| UBUNTU-CVE-2024-6385 | critical | 9.8 | An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user u | gitlab | — | |
| UBUNTU-CVE-2024-38998 | critical | 9.8 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | requirejs | — | |
| UBUNTU-CVE-2024-35325 | critical | 9.8 | A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free. | libyaml | — | |
| UBUNTU-CVE-2024-35326 | critical | 9.8 | libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. | libyaml | — | |
| UBUNTU-CVE-2024-35863 | critical | — | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | linux-hwe-edge | — | |
| UBUNTU-CVE-2024-3094 | critical | — | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source | xz-utils | 5.2.4-1ubuntu1.1 |
Top recent high-severity CVEs (Ubuntu 22.04 / Ubuntu ecosystem)
| CVE | Sev. | CVSS | Summary | Package | Fix in | Published |
|---|---|---|---|---|---|---|
| UBUNTU-CVE-2026-43284 | high | — | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb | linux | — | |
| UBUNTU-CVE-2026-43500 | high | — | rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present | linux | — | |
| UBUNTU-CVE-2026-23918 | high | — | http2: double free and possible RCE on early reset | apache2 | 2.4.66-2ubuntu2.1 | |
| UBUNTU-CVE-2026-31431 | high | — | In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operatin | linux-azure | — | |
| UBUNTU-CVE-2026-41651 | high | — | security update | packagekit | 0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1 | |
| UBUNTU-CVE-2026-34197 | high | — | Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. | activemq | — | |
| UBUNTU-CVE-2026-35535 | high | — | In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation. | sudo | 1.9.9-1ubuntu2.6 | |
| UBUNTU-CVE-2026-23410 | high | — | In the Linux kernel, the following vulnerability has been resolved: apparmor: fix race on rawdata dereference There is a race condition that leads to a use-after-free situation: because the rawdata inodes are not refcounted, an attacker can | linux-azure | — |
Notable
Recent CVEs Ubuntu 22.04 operators should know.
- CVE-2024-6387 (regreSSHion) — OpenSSH signal-handler race producing pre-auth RCE.. Ubuntu advisory · Noxen deep-dive.
- CVE-2024-3094 (xz backdoor) — Supply-chain backdoor in xz-utils 5.6.0 / 5.6.1.. Ubuntu advisory · Noxen deep-dive.
- CVE-2024-1086 (nf_tables UAF) — Linux kernel privilege-escalation, observed in the wild.. Ubuntu advisory.
- CVE-2026-31431 (kernel algif_aead) — Local privilege escalation in the kernel's userspace AEAD interface.. Ubuntu advisory · Noxen deep-dive.
Scan an Ubuntu 22.04 fleet with Noxen
Add your Ubuntu 22.04 hosts via your existing
~/.ssh/config; Noxen reads dpkg state and
matches against the live signed feed. No agent, no SaaS round-trip.
$79 one-time.