Ubuntu Security Notices
Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.
To report a security vulnerability in an Ubuntu package, please contact the Security Team.
The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.
Search USNs
USN ID, name, description or CVE ID contains
61 - 70 of 193 results
23 April 2015
wpa_supplicant could be made to crash, expose memory, or run programs if it received specially crafted network traffic.
- Ubuntu 15.04 ,
- 14.10 ,
- 14.04 LTS
CVE ID
23 April 2015
usb-creator could be tricked into running programs as an administrator.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04
21 April 2015
Several security issues were fixed in MySQL.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04
CVE ID
CVE-2015-0433, CVE-2015-0441, CVE-2015-0499 + 5 others
21 April 2015
Several security issues were fixed in OpenJDK 7.
- Ubuntu 14.10 ,
- 14.04 LTS
CVE ID
CVE-2015-0460, CVE-2015-0469, CVE-2015-0477 + 3 others
20 April 2015
Several security issues were fixed in PHP.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04 ,
- 10.04
CVE ID
CVE-2015-2305, CVE-2015-2348, CVE-2015-2783 + 3 others
16 April 2015
Apport could be tricked into running programs as an administrator.
- Ubuntu 14.10 ,
- 14.04 LTS
14 April 2015
Apport could be tricked into running programs as an administrator.
- Ubuntu 14.10 ,
- 14.04 LTS
CVE ID
13 April 2015
libx11 could be made to crash or run programs if it processed specially crafted data.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04
CVE ID
13 April 2015
Several security issues were fixed in NTP.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04
CVE ID
9 April 2015
dpkg could be tricked into bypassing source package signature checks.
- Ubuntu 14.10 ,
- 14.04 LTS,
- 12.04 ,
- 10.04
CVE ID
Resources
Join the discussion
Canonical is offering
Expanded Security Maintenance
Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.