CVE reports

The Common Vulnerabilities and Exposures (CVE) system is used to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. Canonical keeps track of all CVEs affecting Ubuntu, and releases a security notice when an issue is fixed. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section


Search CVEs


Recent CVEs

CVE-2025-67896

High priority
Needs evaluation

Exim before 4.99.1 allows remote heap corruption that will be further described on 2025-12-18.

1 affected package

exim4


CVE-2025-66570

High priority
Needs evaluation

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions....

1 affected package

cpp-httplib


CVE-2025-52881

High priority

Some fixes available 5 of 13

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use...

3 affected packages

runc, runc-app, runc-stable


CVE-2025-52565

High priority

Some fixes available 5 of 13

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks...

3 affected packages

runc, runc-app, runc-stable


CVE-2025-31133

High priority

Some fixes available 5 of 13

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that...

3 affected packages

runc, runc-app, runc-stable