ubuntu.com Open in urlscan Pro
2620:2d:4000:1::28  Public Scan

Submitted URL: http://security.ubuntu.com/
Effective URL: https://ubuntu.com/security/notices
Submission: On June 02 via manual from MA — Scanned from DE

Form analysis 2 forms found in the DOM

/search

<form action="/search" class="p-search-box" id="ubuntu-global-search-form">
  <input type="search" class="p-search-box__input" name="q" placeholder="Search our sites" required="" aria-label="Search our sites">
  <button type="reset" class="p-search-box__reset"><i class="p-icon--close">Close</i></button>
  <button type="submit" class="p-search-box__button"><i class="p-icon--search">Search</i></button>
</form>

GET /security/notices

<form action="/security/notices" method="GET" class="p-form js-form">
  <input class="js-order-input" type="hidden" name="order" value="newest">
  <div class="row u-equal-height">
    <div class="col-4">
      <label class="p-form__label" for="release">Release:</label>
      <select class="p-form__control js-release" name="release" id="release">
        <option value="">Any</option>
        <option value="mantic"> Ubuntu 23.10 </option>
        <option value="lunar"> Ubuntu 23.04 </option>
        <option value="kinetic"> Ubuntu 22.10 </option>
        <option value="jammy"> Ubuntu 22.04 LTS </option>
        <option value="impish"> Ubuntu 21.10 </option>
        <option value="hirsute"> Ubuntu 21.04 </option>
        <option value="groovy"> Ubuntu 20.10 </option>
        <option value="focal"> Ubuntu 20.04 LTS </option>
        <option value="eoan"> Ubuntu 19.10 </option>
        <option value="disco"> Ubuntu 19.04 </option>
        <option value="cosmic"> Ubuntu 18.10 </option>
        <option value="bionic"> Ubuntu 18.04 ESM </option>
        <option value="artful"> Ubuntu 17.10 </option>
        <option value="zesty"> Ubuntu 17.04 </option>
        <option value="yakkety"> Ubuntu 16.10 </option>
        <option value="xenial"> Ubuntu 16.04 ESM </option>
        <option value="wily"> Ubuntu 15.10 </option>
        <option value="vivid"> Ubuntu 15.04 </option>
        <option value="utopic"> Ubuntu 14.10 </option>
        <option value="trusty"> Ubuntu 14.04 ESM </option>
        <option value="saucy"> Ubuntu 13.10 </option>
        <option value="raring"> Ubuntu 13.04 </option>
        <option value="quantal"> Ubuntu 12.10 </option>
        <option value="precise"> Ubuntu 12.04 </option>
        <option value="oneiric"> Ubuntu 11.10 </option>
        <option value="natty"> Ubuntu 11.04 </option>
        <option value="maverick"> Ubuntu 10.10 </option>
        <option value="lucid"> Ubuntu 10.04 </option>
        <option value="karmic"> Ubuntu 9.10 </option>
        <option value="jaunty"> Ubuntu 9.04 </option>
        <option value="intrepid"> Ubuntu 8.10 </option>
        <option value="hardy"> Ubuntu 8.04 </option>
        <option value="gutsy"> Ubuntu 7.10 </option>
        <option value="feisty"> Ubuntu 7.04 </option>
        <option value="edgy"> Ubuntu 6.10 </option>
        <option value="dapper"> Ubuntu 6.06 </option>
        <option value="breezy"> Ubuntu 5.10 </option>
        <option value="hoary"> Ubuntu 5.04 </option>
        <option value="warty"> Ubuntu 4.10 </option>
      </select>
    </div>
    <div class="col-8">
      <div class="row">
        <div class="col-6">
          <label class="p-form__label" for="details">Details contain:</label>
          <input class="p-form__control js-details" type="text" name="details" id="details" value="">
        </div>
        <div class="col-2 u-align--right" style="display: flex; align-items: flex-end;">
          <button type="submit" class="p-button--positive js-submit" style="width:100%;" disabled="">Search</button>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

Skip to main content
Canonical logo
 * We are hiring
 * Products


PRODUCTS

 * Ubuntu
 * Snapcraft
 * LXD
 * MAAS
 * Charmed OpenStack
 * Charmed Kubernetes
 * Juju
 * Multipass
 * Ubuntu Pro


ALSO FROM CANONICAL

 * Launchpad
 * Ubuntu Image Service
 * Cloud-init
 * Mir
 * Landscape
 * Netplan
 * Charmed Kubeflow
 * MicroK8s
 * MicroStack


RESOURCES

 * Webinars
 * Tutorials
 * Videos
 * Case studies
 * White papers
 * Docs
 * Training
 * Blog
 * Developer
 * Install
 * Download


ABOUT

 * Ubuntu
 * Canonical
 * Press centre
 * Partners
 * Contact

 * UBUNTU ›
   
   The new standard secure enterprise Linux for servers, desktops, clouds,
   developers and things.

 * SNAPCRAFT ›
   
   The app store with secure packages and ultra-reliable updates for multiple
   Linux distros.
   
    * Login ›

 * LXD ›
   
   A pure-container hypervisor. Replace legacy app VMs with containers for speed
   and density

 * MAAS ›
   
   Create a bare-metal cloud with Metal as a Service for IPAM and provisioning

 * CHARMED OPENSTACK ›
   
   Upgrades, maintenance, support, and fully managed options for long-term
   low-cost infra.

 * CHARMED KUBERNETES ›
   
   App portability for K8s on VMware, Amazon, Azure, Google, Oracle, IBM and
   bare metal.

 * JUJU ›
   
   Model-driven multi-cloud operations for applications. On-premise or on-cloud
   SAAS app store, with big data, k8s and openstack solutions

 * MULTIPASS ›
   
   On-demand build-and-test VMs for cloud devs on Windows, Mac and Linux
   desktops

 * UBUNTU PRO ›
   
   Extended Security Maintenance, Kernel Livepatch, FIPS, enterprise support and
   certification.
   
    * Your subscriptions ›
    * Support login ›


ALSO FROM CANONICAL

LAUNCHPAD ›

The software collaboration platform behind Ubuntu.

 * Login ›

UBUNTU IMAGE SERVICE ›

Hardened, standardised or customised Ubuntu images on public clouds and private
infra.

CLOUD-INIT ›

Control and customise your cloud instances on boot and during their lifecycle.

MIR ›

Ultra-fast and lightweight Wayland compositor for secure desktop and device
displays.

LANDSCAPE ›

Updates, package management, repositories, security, and regulatory compliance
for Ubuntu.

NETPLAN ›

Network abstraction for Linux to simplify and standardise complex network
configuration.

CHARMED KUBEFLOW ›

AI and MLOps at any scale, on any cloud.

MICROK8S ›

Small, fast, and fully-conformant Kubernetes for developers and IoT.

MICROSTACK ›

Single-node OpenStack for developers and IoT.


RESOURCES

 * Webinars
 * Tutorials
 * Videos
 * Case studies
 * White papers
 * Docs
 * Training
 * Blog
 * Developer
 * Install
 * Download


ABOUT

 * Ubuntu
 * Canonical
 * Press centre
 * Partners
 * Contact


Ubuntu

SECURITY

Sign in
 * Enterprise
 * Developer
 * Community
 * Download

 * OpenStack
 * Kubernetes
 * Desktop
 * IoT
 * Support
 * Downloads

 * Search Search
 * Sign in

Close Search



SECURITY

 * ESM
 * Livepatch
 * Certifications & Hardening
 * CVEs
 * Notices
 * Docker Images

Your submission was sent successfully! Close

You have successfully unsubscribed! Close


UBUNTU SECURITY NOTICES

Developers issue an Ubuntu Security Notice when a security issue is fixed in an
official Ubuntu package.

To report a security vulnerability in an Ubuntu package, please contact the
Security Team.

The Security Team also produces OVAL files for each Ubuntu release. These are an
industry-standard machine-readable format dataset that contain details of all
known security vulnerabilities and fixes relevant to the Ubuntu release, and can
be used to determine whether a particular patch is appropriate. OVAL files can
also be used to audit a system to check whether the latest security fixes have
been applied.


SEARCH

Release: Any Ubuntu 23.10 Ubuntu 23.04 Ubuntu 22.10 Ubuntu 22.04 LTS Ubuntu
21.10 Ubuntu 21.04 Ubuntu 20.10 Ubuntu 20.04 LTS Ubuntu 19.10 Ubuntu 19.04
Ubuntu 18.10 Ubuntu 18.04 ESM Ubuntu 17.10 Ubuntu 17.04 Ubuntu 16.10 Ubuntu
16.04 ESM Ubuntu 15.10 Ubuntu 15.04 Ubuntu 14.10 Ubuntu 14.04 ESM Ubuntu 13.10
Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 11.04 Ubuntu 10.10
Ubuntu 10.04 Ubuntu 9.10 Ubuntu 9.04 Ubuntu 8.10 Ubuntu 8.04 Ubuntu 7.10 Ubuntu
7.04 Ubuntu 6.10 Ubuntu 6.06 Ubuntu 5.10 Ubuntu 5.04 Ubuntu 4.10
Details contain:
Search


LATEST NOTICES


USN-6135-1: LINUX KERNEL (AZURE CVM) VULNERABILITIES ›

2 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-32233, CVE-2023-1380, CVE-2023-2612, and 2 others

 * Ubuntu 22.04 LTS
 * Ubuntu 20.04 LTS


USN-6134-1: LINUX KERNEL (INTEL IOTG) VULNERABILITIES ›

1 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-1075, CVE-2023-0459, CVE-2023-20938, and 21 others

 * Ubuntu 20.04 LTS


USN-6133-1: LINUX KERNEL (INTEL IOTG) VULNERABILITIES ›

1 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-32269, CVE-2023-1513, CVE-2023-0459, and 9 others

 * Ubuntu 22.04 LTS


USN-6132-1: LINUX KERNEL VULNERABILITIES ›

1 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-0459, CVE-2023-30456, CVE-2023-1380, and 10 others

 * Ubuntu 20.04 LTS
 * Ubuntu 18.04 ESM


USN-6131-1: LINUX KERNEL VULNERABILITIES ›

1 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-30456, CVE-2023-1380, CVE-2023-32233, and 2 others

 * Ubuntu 20.04 LTS
 * Ubuntu 18.04 ESM


USN-6130-1: LINUX KERNEL VULNERABILITIES ›

1 June 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-30456, CVE-2023-1380, CVE-2023-32233, and 1 other

 * Ubuntu 18.04 ESM
 * Ubuntu 16.04 ESM
 * Ubuntu 14.04 ESM


USN-6128-2: CUPS VULNERABILITY ›

1 June 2023

CUPS could be made to crash or run programs if it received specially crafted
network traffic.

CVE-2023-32324

 * Ubuntu 16.04 ESM


USN-6129-1: AVAHI VULNERABILITY ›

1 June 2023

Avahi could be made to crash if it received specially crafted DBus traffic.

CVE-2023-1981

 * Ubuntu 23.04
 * Ubuntu 22.10
 * Ubuntu 22.04 LTS
 * Ubuntu 20.04 LTS


USN-6128-1: CUPS VULNERABILITY ›

1 June 2023

CUPS could be made to crash or run programs if it received specially crafted
network traffic.

CVE-2023-32324

 * Ubuntu 23.04
 * Ubuntu 22.10
 * Ubuntu 22.04 LTS
 * Ubuntu 20.04 LTS
 * Ubuntu 18.04 ESM


USN-6127-1: LINUX KERNEL VULNERABILITIES ›

31 May 2023

Several security issues were fixed in the Linux kernel.

CVE-2023-32233, CVE-2023-1380, CVE-2023-2612, and 2 others

 * Ubuntu 22.10
 * Ubuntu 22.04 LTS
 * Ubuntu 20.04 LTS


SUBSCRIBE

 * Atom
 * RSS
 * Mailing list

 1. Previous page
 2. 1
 3. 2
 4. 3
 5. 4
 6. 5
 7. Next page


SUBSCRIBE

 * Atom
 * RSS
 * Mailing list


JOIN THE DISCUSSION

 * Ubuntu security updates mailing list
 * Security announcements mailing list


CANONICAL IS OFFERING EXPANDED SECURITY MAINTENANCE

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security
fixes and essential packages.

Find out more about ESM ›


FURTHER READING

 * Big data security foundations in five steps
 * Phoenix Systems sets a new standard for secure cloud services with Canonical
   and IBM
 * What is System Hardening? Essential Checklists from OS to Applications
 * Join us at Everything Open 2023 in Melbourne to Learn about Open Source
   Technologies and Best Practices for Linux Security
 * Setup your own VPN server

Back to top


 * OPENSTACK OPENSTACK
   
   * What is OpenStack
   * Features
   * Managed
   * Consulting
   * Install
   * Support


 * CEPH CEPH
   
   * What is Ceph
   * Managed
   * Consulting
   * Docs
   * Install


 * MANAGED MANAGED
   
   * OpenStack
   * Kubernetes
   * Ceph
   * Apps
   * Observability


 * KUBERNETES KUBERNETES
   
   * What is Kubernetes
   * Charmed Kubernetes
   * Managed
   * Install
   * Docs
   * Resources


 * AI / ML AI / ML
   
   * What is Kubeflow
   * Services


 * ROBOTICS ROBOTICS
   
   * ROS ESM
   * What is ROS
   * Community
   * Docs


 * CLOUD CLOUD
   
   * What is cloud computing
   * What is private cloud
   * What is hybrid cloud
   * What is multi-cloud
   * Public cloud


 * IOT IOT
   
   * App store
   * Embedded Linux
   * EdgeX
   * Management


 * RASPBERRY PI RASPBERRY PI
   
   * Desktop
   * Server


 * CORE CORE
   
   * Consulting
   * Success stories
   * Features
   * Tutorials
   * Docs


 * DESKTOP DESKTOP
   
   * Features
   * Organisations
   * Developers
   * Partners
   * Flavours


 * SERVER SERVER
   
   * Hyperscale
   * Docs


 * SECURITY SECURITY
   
   * ESM
   * Livepatch
   * Certifications & Hardening
   * CVEs
   * Notices
   * Docker Images


 * DOWNLOADS DOWNLOADS
   
   * Desktop
   * Server
   * IoT
   * Cloud


 * OBSERVABILITY OBSERVABILITY
   
   * What is observability
   * Managed


 * APPLIANCE APPLIANCE
   
   * About
   * Portfolio
   * Community
   * Hardware
   * Virtual machines


 * SUPPORT SUPPORT
   
   * Your subscriptions
   * Account users
   * Support
   * Pricing
   * Discourse


 * PRICING PRICING
   
   * Support
   * Consulting
   * Desktops
   * Devices


 * SECTORS
   
   * Automotive
   * Industrial
   * Government
   * Telco
   * Finance
 * * Containers
   * Tutorials
   * 16-04
   * Model-driven operations
   * Landscape
   * Canonical Embedding Programme

--------------------------------------------------------------------------------

 * Contact us
 * Contact us
 * About us
 * Community
 * Careers
 * Blog
 * Resources
 * Press centre

© 2023 Canonical Ltd. Ubuntu and Canonical are registered trademarks of
Canonical Ltd.

 * Legal information
 * Data privacy
 * Manage your tracker settings
 * Report a bug on this site

 * 
 * 
 * 
 * 

Go to the top of the page


YOUR TRACKER SETTINGS

We use cookies and similar methods to recognise visitors and remember
preferences. We also use them to measure campaign effectiveness and analyse site
traffic.

By selecting ‘Accept‘, you consent to the use of these methods by us and trusted
third parties.

For further details or to change your consent choices at any time see our cookie
policy.

Accept all and visit site Manage your tracker settings