Ubuntu Security Notices
Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.
To report a security vulnerability in an Ubuntu package, please contact the Security Team.
The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.
Search USNs
USN ID, name, description or CVE ID contains
151 - 160 of 229 results
5 October 2009
GLib vulnerability
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
1 October 2009
OpenOffice.org vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
1 October 2009
Samba vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
CVE-2009-1886, CVE-2009-1888, CVE-2009-2813 + 2 others
28 September 2009
Dovecot vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
CVE-2008-4577, CVE-2008-5301, CVE-2009-2632 + 1 other
24 September 2009
Newt vulnerability
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
23 September 2009
WebKit vulnerabilities
- Ubuntu 9.04 ,
- 8.10
CVE ID
CVE-2009-0945, CVE-2009-1687, CVE-2009-1690 + 4 others
21 September 2009
neon vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
21 September 2009
PostgreSQL vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
17 September 2009
KDE-Libs vulnerability
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
14 September 2009
OpenEXR vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
Resources
Join the discussion
Get up to 15 years of security
maintenance for your new or established systems
Get up to 15 years of security maintenance for your entire Ubuntu Archive. Keep your systems stable with security backporting and avoid forced upgrades.