Ubuntu Security Notices

Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.

To report a security vulnerability in an Ubuntu package, please contact the Security Team.

The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.

Subscribe for updates  

Mailing list Atom RSS

Search USNs

USN ID, name, description or CVE ID contains


Filter by Ubuntu release

61 - 70 of 193 results

23 April 2015

wpa_supplicant could be made to crash, expose memory, or run programs if it received specially crafted network traffic.

  • Ubuntu 15.04 ,
  • 14.10 ,
  • 14.04 LTS

CVE ID

CVE-2015-1863


23 April 2015

usb-creator could be tricked into running programs as an administrator.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04

21 April 2015

Several security issues were fixed in MySQL.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04

21 April 2015

Several security issues were fixed in OpenJDK 7.

  • Ubuntu 14.10 ,
  • 14.04 LTS

20 April 2015

Several security issues were fixed in PHP.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04 ,
  • 10.04

16 April 2015

Apport could be tricked into running programs as an administrator.

  • Ubuntu 14.10 ,
  • 14.04 LTS

14 April 2015

Apport could be tricked into running programs as an administrator.

  • Ubuntu 14.10 ,
  • 14.04 LTS

CVE ID

CVE-2015-1318


13 April 2015

libx11 could be made to crash or run programs if it processed specially crafted data.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04

CVE ID

CVE-2013-7439


13 April 2015

Several security issues were fixed in NTP.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04

9 April 2015

dpkg could be tricked into bypassing source package signature checks.

  • Ubuntu 14.10 ,
  • 14.04 LTS,
  • 12.04 ,
  • 10.04

CVE ID

CVE-2015-0840



Resources


Further reading

  • Loading...

Canonical is offering
Expanded Security Maintenance

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.