Ubuntu Security Notices

Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.

To report a security vulnerability in an Ubuntu package, please contact the Security Team.

The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.

Subscribe for updates  

Mailing list Atom RSS

Search USNs

USN ID, name, description or CVE ID contains


Filter by Ubuntu release

51 - 60 of 234 results

14 December 2006

Linux kernel vulnerabilities

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

8 December 2006

Ruby vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-6303


7 December 2006

GnuPG vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-6235


6 December 2006

evince vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-5864


4 December 2006

xine-lib vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-6172


4 December 2006

libgsf vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-4514


30 November 2006

evince vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

CVE ID

CVE-2006-5864


29 November 2006

GnuPG vulnerability

  • Ubuntu 6.10 ,
  • 6.06 ,
  • 5.10

29 November 2006

KOffice vulnerability

  • Ubuntu 5.10

CVE ID

CVE-2006-6120


28 November 2006

ImageMagick vulnerability

  • Ubuntu 6.06 ,
  • 5.10

CVE ID

CVE-2006-5868



Resources


Further reading

  • Loading...

Canonical is offering
Expanded Security Maintenance

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.