View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu-cve-tracker
Members of Ubuntu Security Team can upload to this repository. Log in for directions.

Ubuntu CVE Tracker has 11 active reviews. See all merge proposals.

Branches

Name Last Modified Last Commit
master 2026-03-06 22:24:44 UTC
Merge remote-tracking branch 'mrmajumder/assign-go-git-to-mrmajumder'

Author: Federico Quattrin
Author Date: 2026-03-06 22:24:44 UTC

Merge remote-tracking branch 'mrmajumder/assign-go-git-to-mrmajumder'

datalib_refactor_final_v3_for_real_this_time 2026-03-02 01:23:57 UTC
Switch to a pure-python debian version comparison

Author: John Breton
Author Date: 2026-02-27 19:42:31 UTC

Switch to a pure-python debian version comparison

I believe the performance issues were related to spawning
various subprocesses when comparing Versions, which in
hindsight wasn't ideal. This commit ports lib/dpkg/version.c
into pure Python, which should give the same performance
benefits of apt_pkg without relying on its import

Additionally, fixed a small in USN.get_cveS_affecting_release(),
when looking back over the code I noticed the conditional here
were not matching what was previously implemented. I've re-added
a fast-path for `'regression' in self.title` to handle regression
USNs. I also combined two checks that were incorrectly being used
(the first elif was dead-code and would never trigger) and adapted
it to make use of version matching across a list of tuples.

Finally, I attempted to fix test/test_subproject_cve_creation.py. I
*think* this just requires the creation of $UCT/meta_lists/subprojects.json
where $UCT is the tmp testing directory created for this test.
Fingers crossed that fixes it.

Signed-off-by: John Breton <john.breton@canonical.com>

generate_pkg_cache_more_debug 2026-01-15 14:45:04 UTC
scripts/generate_pkg_cache.py: Add a counter to check the progress if debug i...

Author: Paulo Flabiano Smorigo
Author Date: 2026-01-15 14:45:04 UTC

scripts/generate_pkg_cache.py: Add a counter to check the progress if debug is on

Signed-off-by: Paulo Flabiano Smorigo <pfsmorigo@canonical.com>

improve-error-message-usn-gen-template 2026-01-09 15:08:18 UTC
Report per package missing package_info_overrides entries

Author: Vyom Yadav
Author Date: 2026-01-09 15:08:18 UTC

Report per package missing package_info_overrides entries

Signed-off-by: Vyom Yadav <vyom.yadav@canonical.com>

check-cves_skip-kernel-upstream 2025-12-18 12:57:54 UTC
s/check-cves: skip kernel pkg when debian is not-affected

Author: Rodrigo Figueiredo Zaiden
Author Date: 2025-12-18 12:57:54 UTC

s/check-cves: skip kernel pkg when debian is not-affected

 for upstream entry based on debian skip kernel pkg ('linux') to avoid
 things like:
   upstream_linux: not-affected (debian: Vulnerable code not present)
 as for the kernel pkg upstream is kernel.org and the autotriage bot
 does its job updating this entry.

Signed-off-by: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>

patching_coordination 2025-10-21 13:44:28 UTC
Change logic for filtering subproject releases

Author: Nick Galanis
Author Date: 2025-10-21 13:44:28 UTC

Change logic for filtering subproject releases

Signed-off-by: Nick Galanis <nick.galanis@canonical.com>

usn-refactor 2025-10-16 13:18:21 UTC
usn tooling: Ignore empty archs, temp fix for amd64v3 in questing

Author: Nick Galanis
Author Date: 2025-10-16 13:18:21 UTC

usn tooling: Ignore empty archs, temp fix for amd64v3 in questing

Signed-off-by: Nick Galanis <nick.galanis@canonical.com>

check-syntax-retired 2025-06-12 14:30:08 UTC
Revise check-syntax check to be smarter

Author: John Breton
Author Date: 2025-06-04 14:20:10 UTC

Revise check-syntax check to be smarter

Now it only checks UCT CVEs by looking to see
if the release is in uct_required_releases, which
is what I should have done from the start .-.

Signed-off-by: John Breton <john.breton@canonical.com>

kev/updating-not-for-us 2024-06-12 13:55:59 UTC
Add CVE-2002-0367, CVE-2004-0210, CVE-2004-1464 to ignored

Author: Diogo Sousa
Author Date: 2024-06-12 12:58:25 UTC

Add CVE-2002-0367, CVE-2004-0210, CVE-2004-1464 to ignored

These CVEs are referenced in KEV but were not present in
our tracker

Added at the top to keep with rough chronological order

update-trusty-esm-eol 2024-04-30 17:19:08 UTC
Updated the esm_expires field in Trusty to reflect Legacy Support

Author: Diogo Sousa
Author Date: 2024-04-30 17:19:08 UTC

Updated the esm_expires field in Trusty to reflect Legacy Support

check-cves-argparse 2024-03-15 19:38:32 UTC
check-cves: deprecate optparse for argparse

Author: Mark Esler
Author Date: 2024-03-15 05:37:56 UTC

check-cves: deprecate optparse for argparse

fixup-fixup 2024-02-16 15:33:55 UTC
check-syntax: remove bogus line numbers now that check-syntax-fixup is gone

Author: Marc Deslauriers
Author Date: 2024-02-16 15:33:55 UTC

check-syntax: remove bogus line numbers now that check-syntax-fixup is gone

adding_special_ppas_flag 2022-04-04 09:57:04 UTC
Adding special-ppa flag in order to handle ppas that are special for us and w...

Author: Leonidas S. Barbosa
Author Date: 2022-04-04 09:57:04 UTC

Adding special-ppa flag in order to handle ppas that are special for us and we want to adress, like ~canonical-chromium-browser

ignored-status-update 2022-03-23 18:11:42 UTC
Update to guidelines in README regarding 'ignored' status

Author: Alex Burrage
Author Date: 2022-03-23 18:11:42 UTC

Update to guidelines in README regarding 'ignored' status

private-usns 2021-02-12 20:34:11 UTC
scripts/sis-generate-usn: Add PUBLISH flag

Author: Paulo Flabiano Smorigo
Author Date: 2021-02-10 23:10:15 UTC

scripts/sis-generate-usn: Add PUBLISH flag

Signed-off-by: Paulo Flabiano Smorigo <pfsmorigo@canonical.com>

trusty-experimental-to-prod 2020-11-24 11:14:36 UTC
Add descriptions to ESM experimental -> public migration scripts

Author: Mike Salvatore
Author Date: 2020-11-24 11:14:36 UTC

Add descriptions to ESM experimental -> public migration scripts

publish-cves 2020-08-26 17:29:02 UTC
Minor refactor and bugfix of code to publish CVEs to new web API

Author: Mike Salvatore
Author Date: 2020-08-26 17:29:02 UTC

Minor refactor and bugfix of code to publish CVEs to new web API

add_epoch_to_oval_2 2020-04-10 21:19:50 UTC
The ignored_package_fields and ignored_releases were being ignored.

Author: Joy Latten
Author Date: 2020-04-08 23:20:15 UTC

The ignored_package_fields and ignored_releases were being ignored.

When running the scripts,
WARNING: Unknown package field "Patches" in Patches_ruby2.1 in "././active/CVE-2019-8324"
WARNING: Unknown package field "upstream" in upstream_ruby2.1 in "././active/CVE-2019-8324"

add_gpl_to_oval 2020-03-03 21:03:19 UTC
Add GPLv3 to the generated OVAL.

Author: Joy Latten
Author Date: 2020-03-03 21:03:19 UTC

Add GPLv3 to the generated OVAL.

snaps 2019-09-19 13:07:47 UTC
cve.vim: Make vim cve syntax snap aware

Author: Alex Murray
Author Date: 2019-09-19 13:07:47 UTC

cve.vim: Make vim cve syntax snap aware

esm_stats_branch 2019-08-29 23:29:47 UTC
updating help

Author: Emilia Torino
Author Date: 2019-08-29 23:29:47 UTC

updating help

parse-notes 2019-08-27 04:38:14 UTC
html_export.py: Make Notes: contents more readable

Author: Alex Murray
Author Date: 2019-08-27 04:33:54 UTC

html_export.py: Make Notes: contents more readable

We do this by formatting as a table using the now-structured Notes data
from cve_lib.py

trusty_esm_stats 2019-07-29 19:14:45 UTC
improving output message

Author: Emilia Torino
Author Date: 2019-07-29 19:14:45 UTC

improving output message

123 of 23 results

Other repositories

Name Last Modified
lp:~canonical-kernel-team/ubuntu-cve-tracker 8 hours ago
lp:ubuntu-cve-tracker 2026-03-06
lp:~kkernick/ubuntu-cve-tracker 2026-03-06
lp:~mrmajumder/ubuntu-cve-tracker 2026-03-06
lp:~hlibk/ubuntu-cve-tracker 2026-03-06
lp:~ebarretto/ubuntu-cve-tracker 2026-03-06
lp:~nickgalanis/ubuntu-cve-tracker 2026-03-06
lp:~jslarraz/ubuntu-cve-tracker 2026-03-04
lp:~lucistanescu/ubuntu-cve-tracker 2026-02-27
lp:~iconstantin/ubuntu-cve-tracker 2026-02-25
lp:~rodrigo-zaiden/ubuntu-cve-tracker 2026-02-24
lp:~bruce-cable/ubuntu-cve-tracker 2026-01-20
lp:~federicoquattrin/ubuntu-cve-tracker 2026-01-12
lp:~allenpthuang/ubuntu-cve-tracker 2026-01-08
lp:~tswhison/ubuntu-cve-tracker 2026-01-06
lp:~yomonokio/ubuntu-cve-tracker 2025-12-17
lp:~mdeslaur/ubuntu-cve-tracker 2025-12-02
lp:~evancaville/ubuntu-cve-tracker 2025-11-27
lp:~ej7367/ubuntu-cve-tracker 2025-10-30
lp:~gomesjoao/ubuntu-cve-tracker 2025-10-29
lp:~benjaminwheeler/ubuntu-cve-tracker 2025-10-08
lp:~warhodes/ubuntu-cve-tracker 2025-09-29
lp:~elisehdy/ubuntu-cve-tracker 2025-09-26
lp:~0xdsousa/ubuntu-cve-tracker 2025-09-21
lp:~jacobmartin/ubuntu-cve-tracker 2025-08-06
lp:~noam-ns/ubuntu-cve-tracker 2025-07-25
lp:~flor-cabral/ubuntu-cve-tracker 2025-07-23
lp:~mainek00n/ubuntu-cve-tracker 2025-07-23
lp:~ines-almeida/ubuntu-cve-tracker 2025-07-11
lp:~ines-almeida/ubuntu-cve-tracker/+git/another-repo 2025-07-11
lp:~shishirsub10/ubuntu-cve-tracker 2025-07-11
lp:~5tev3/ubuntu-cve-tracker 2025-07-09
lp:~gianz/ubuntu-cve-tracker 2025-06-22
lp:~john-breton/ubuntu-cve-tracker 2025-06-12
lp:~octagalland/ubuntu-cve-tracker 2025-06-10
lp:~0xnishit/ubuntu-cve-tracker 2025-05-26
lp:~sbeattie/ubuntu-cve-tracker/+git/ubuntu-cve-tracker 2025-05-08
lp:~cengizcan/ubuntu-cve-tracker 2025-05-05
lp:~vyomydv/ubuntu-cve-tracker 2025-03-26
lp:~nic89/ubuntu-cve-tracker 2025-03-14
lp:~marek-suchanek/ubuntu-cve-tracker 2025-02-27
lp:~alexmurray/ubuntu-cve-tracker 2025-02-03
lp:~iconstantin/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-1 2024-12-16
lp:~eslerm/ubuntu-cve-tracker 2024-12-14
lp:~nic89/ubuntu-cve-tracker/+git/UCT 2024-12-13
lp:~nic89/ubuntu-cve-tracker/+git/cve-2024-50602 2024-11-15
lp:~sayun/ubuntu-cve-tracker/+git/UCT 2024-10-28
lp:~juliaphoebe/ubuntu-cve-tracker 2024-10-17
lp:~apw/ubuntu-cve-tracker 2024-10-03
lp:~emitorino/ubuntu-cve-tracker 2024-08-21
lp:~litios/ubuntu-cve-tracker 2024-07-08
lp:~sudhackar/ubuntu-cve-tracker 2024-06-27
lp:~sbeattie/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-2 2024-05-16
lp:~sahnaseredini/ubuntu-cve-tracker 2024-03-01
lp:~pfsmorigo/ubuntu-cve-tracker 2024-03-01
lp:~kees/ubuntu-cve-tracker 2024-02-22
lp:~awe/ubuntu-cve-tracker 2023-10-12
lp:~cache-use-only/ubuntu-cve-tracker 2023-09-19
lp:~cascardo/ubuntu-cve-tracker 2023-08-30
lp:~cascardo/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-1 2023-08-30
lp:~sespiros/ubuntu-cve-tracker/+git/ubuntu-cve-tracker 2023-05-25
lp:~zhsj/ubuntu-cve-tracker 2023-04-14
lp:~litios/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-1 2023-01-13
lp:~rayveldkamp/ubuntu-cve-tracker 2022-07-20
lp:~guyceo2/ubuntu-cve-tracker 2022-05-18
lp:~aburrage/ubuntu-cve-tracker 2022-03-23
lp:~hswu/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-1 2021-12-04
lp:~hswu/ubuntu-cve-tracker 2021-12-04
lp:~cypressyew/ubuntu-cve-tracker 2021-09-18
lp:~chrisccoulson/ubuntu-cve-tracker 2021-08-25
lp:~avital/ubuntu-cve-tracker 2021-05-06
lp:~jdstrand/ubuntu-cve-tracker 2021-02-19
lp:~mikesalvatore/ubuntu-cve-tracker 2021-02-15
lp:~svermaiiti/ubuntu-cve-tracker 2021-01-11
lp:~jgarnier19/ubuntu-cve-tracker 2020-12-17
lp:~isrd/ubuntu-cve-tracker 2020-12-11
lp:~alexmurray/ubuntu-cve-tracker/+git/ubuntu-cve-tracker 2019-10-02
lp:~tyhicks/ubuntu-cve-tracker 2019-10-02
lp:~sbeattie/ubuntu-cve-tracker 2019-08-27
179 of 79 results
You can't create new repositories for Ubuntu CVE Tracker.