Ubuntu Security Notices
Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.
To report a security vulnerability in an Ubuntu package, please contact the Security Team.
The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.
Search USNs
USN ID, name, description or CVE ID contains
31 - 40 of 248 results
16 February 2010
Ruby vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10
CVE ID
11 February 2010
Tomcat vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10
CVE ID
10 February 2010
MySQL vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
CVE-2008-7247, CVE-2009-4019, CVE-2009-4030 + 4 others
5 February 2010
Linux kernel vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
CVE-2009-4031, CVE-2009-4308, CVE-2009-4536 + 9 others
28 January 2010
FUSE vulnerability
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
28 January 2010
Samba vulnerability
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
28 January 2010
lintian vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
27 January 2010
Dhcp vulnerability
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10
CVE ID
22 January 2010
Python 2.4 vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
21 January 2010
Python 2.5 vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04
CVE ID
Resources
Join the discussion
Get up to 15 years of security
maintenance for your new or established systems
Get up to 15 years of security maintenance for your entire Ubuntu Archive. Keep your systems stable with security backporting and avoid forced upgrades.