Ubuntu Security Notices
Developers issue an Ubuntu Security Notice when a security issue is fixed in an official Ubuntu package. You can find additional guidance for high-profile vulnerabilities in the Ubuntu Vulnerability Knowledge Base section.
To report a security vulnerability in an Ubuntu package, please contact the Security Team.
The Security Team also produces OVAL files for each Ubuntu release. These are an industry-standard machine-readable format dataset that contain details of all known security vulnerabilities and fixes relevant to the Ubuntu release, and can be used to determine whether a particular patch is appropriate. OVAL files can also be used to audit a system to check whether the latest security fixes have been applied.
Search USNs
USN ID, name, description or CVE ID contains
4981 - 4990 of 10484 results
17 September 2020
Samba would allow unintended access to files over the network.
- Ubuntu 18.04 LTS,
- 16.04 LTS
CVE ID
17 September 2020
Several security issues were fixed in Perl DBI module.
- Ubuntu 14.04 LTS
CVE ID
16 September 2020
StoreBackup could be made to stop executing or generate a race condition if it received a lock file in the default location.
- Ubuntu 20.04 LTS,
- 18.04 LTS,
- 16.04 LTS
CVE ID
16 September 2020
ncmpc could be made to crash if it received a long chat message.
- Ubuntu 16.04 LTS
CVE ID
16 September 2020
MCabber could be made to modify the roster and intercept messages if it received specially crafted XMPP packets.
- Ubuntu 16.04 LTS
CVE ID
16 September 2020
Attachments with specially crafted filenames could bypass filename-based mail attachment filters.
- Ubuntu 18.04 LTS
CVE ID
16 September 2020
Several security issues were fixed in OpenSSL.
- Ubuntu 18.04 LTS,
- 16.04 LTS
CVE ID
CVE-2019-1547, CVE-2019-1551, CVE-2019-1563 + 1 other
16 September 2020
websocket-extensions could be made to exhaust the server's capacity to process incoming requests if it received specially crafted requests.
- Ubuntu 20.04 LTS,
- 18.04 LTS,
- 16.04 LTS
CVE ID
16 September 2020
Perl DBI module could be made to execute arbitrary code if it received a specially manipulated call.
- Ubuntu 18.04 LTS,
- 16.04 LTS,
- 14.04 LTS,
- 12.04
CVE ID
15 September 2020
LuaJIT could be made crash or expose sensitive information if it received specially crafted input.
- Ubuntu 16.04 LTS
CVE ID
Resources
Join the discussion
Get up to 15 years of security
maintenance for your new or established systems
Get up to 15 years of security maintenance for your entire Ubuntu Archive. Keep your systems stable with security backporting and avoid forced upgrades.