Ubuntu Security Notices
Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.
To report a security vulnerability in an Ubuntu package, please contact the Security Team.
The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.
Search USNs
USN ID, name, description or CVE ID contains
51 - 60 of 248 results
8 January 2010
Firefox 3.0 and Xulrunner 1.9 regression
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
7 January 2010
GIMP vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04
CVE ID
3 January 2010
PostgreSQL vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
18 December 2009
Firefox 3.0 and Xulrunner 1.9 vulnerabilities
- Ubuntu 9.04 ,
- 8.10 ,
- 8.04
CVE ID
CVE-2009-3979, CVE-2009-3981, CVE-2009-3986 + 3 others
18 December 2009
Red Hat Cluster Suite vulnerabilities
- Ubuntu 8.10 ,
- 8.04 ,
- 6.06
CVE ID
CVE-2008-4192, CVE-2008-4579, CVE-2008-4580 + 2 others
11 December 2009
KDE 4 Runtime vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10
11 December 2009
KDE 4 vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10
11 December 2009
KDE vulnerabilities
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04
CVE ID
11 December 2009
PyGreSQL vulnerability
- Ubuntu 8.10 ,
- 8.04
CVE ID
8 December 2009
Ntp vulnerability
- Ubuntu 9.10 ,
- 9.04 ,
- 8.10 ,
- 8.04 ,
- 6.06
CVE ID
Resources
Join the discussion
Get up to 15 years of security
maintenance for your new or established systems
Get up to 15 years of security maintenance for your entire Ubuntu Archive. Keep your systems stable with security backporting and avoid forced upgrades.