Vulnerabilities > Canonical

DATE CVE VULNERABILITY TITLE RISK
2020-09-17 CVE-2019-20919 NULL Pointer Dereference vulnerability in multiple products
An issue was discovered in the DBI module before 1.643 for Perl.
4.7
2020-09-16 CVE-2020-14382 Out-of-bounds Write vulnerability in multiple products
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container.
7.8
2020-09-16 CVE-2020-14392 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643.
5.5
2020-09-15 CVE-2020-14385 Incorrect Calculation of Buffer Size vulnerability in multiple products
A flaw was found in the Linux kernel before 5.9-rc4.
local
low complexity
linux debian canonical CWE-131
5.5
2020-09-15 CVE-2020-14314 A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing.
local
low complexity
linux debian canonical starwindsoftware
5.5
2020-09-15 CVE-2020-14362 Integer Underflow (Wrap or Wraparound) vulnerability in multiple products
A flaw was found in X.Org Server before xorg-x11-server 1.20.9.
local
low complexity
x-org redhat canonical CWE-191
7.8
2020-09-15 CVE-2020-14361 Integer Underflow (Wrap or Wraparound) vulnerability in multiple products
A flaw was found in X.Org Server before xorg-x11-server 1.20.9.
local
low complexity
x-org redhat canonical CWE-191
7.8
2020-09-15 CVE-2020-14346 Integer Underflow (Wrap or Wraparound) vulnerability in multiple products
A flaw was found in xorg-x11-server before 1.20.9.
local
low complexity
x-org redhat canonical CWE-191
7.8
2020-09-15 CVE-2020-14345 A flaw was found in X.Org Server before xorg-x11-server 1.20.9.
local
low complexity
x-org canonical
7.8
2020-09-15 CVE-2020-8927 Classic Buffer Overflow vulnerability in multiple products
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB.
6.5