Ubuntu Security Notices

Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.

To report a security vulnerability in an Ubuntu package, please contact the Security Team.

The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.

Subscribe for updates  

Mailing list Atom RSS

Search USNs

USN ID, name, description or CVE ID contains


Filter by Ubuntu release

231 - 240 of 248 results

3 December 2008

Net-SNMP vulnerabilities

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

2 December 2008

ClamAV vulnerability

  • Ubuntu 8.10

CVE ID

CVE-2008-5314


2 December 2008

Imlib2 vulnerability

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

CVE ID

CVE-2008-5187


27 November 2008

Linux kernel vulnerabilities

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

27 November 2008

Samba vulnerability

  • Ubuntu 8.10

CVE ID

CVE-2008-4314


26 November 2008

GnuTLS vulnerability

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

CVE ID

CVE-2008-4989


26 November 2008

OpenOffice.org vulnerabilities

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

26 November 2008

Thunderbird vulnerabilities

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06

24 November 2008

WebKit vulnerability

  • Ubuntu 8.10

CVE ID

CVE-2008-3632


19 November 2008

libxml2 vulnerabilities

  • Ubuntu 8.10 ,
  • 8.04 ,
  • 7.10 ,
  • 6.06


Resources


Further reading

  • Loading...

Canonical is offering
Expanded Security Maintenance

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.