Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 11 June 2024

Ubuntu Security Notices now available in OSV format


Canonical is now issuing Ubuntu Security Notices (USNs) in the open source OSV format. Using the information provided, developers can identify known third-party, open source dependency vulnerabilities that pose a genuine risk to their application and its environment. This collaboration between Canonical and OSV aims to simplify vulnerability management and further enhance security for Ubuntu users.

“Making sure that Ubuntu Security Notices are actionable and available to 3rd party tools is a key goal for our security engineering team”, said Lech Sandecki, Product Manager at Canonical,  “By collaborating with OSV, we will provide accurate and actionable information about open source software vulnerabilities and fixes available for thousands of open source applications and dependencies maintained by our team”.

This integration is a testament to the ongoing collaboration happening within the OpenSSF Vulnerability Disclosures Working Group. Participation in this working group, facilitates contributions to the OSV project, and enhances the overall security posture of the open source community. 

OSV (Open Source Vulnerability) seeks to reduce the complexities of vulnerability management by providing an open, precise, and distributed approach to producing and consuming vulnerability information for open source. By adopting OSV, Canonical helps expand the comprehensiveness of vulnerability data available in this format, making the combined data set more valuable to open source users for broad open source software vulnerability management. This data unlocks future scanning capabilities in Ubuntu containers.

OSV is not only a format for describing vulnerabilities but also a set of tools and integration opportunities that can consume such information. Tools like OSV-Scanner  provide assessment and remediation guidelines to  users as well . The Ubuntu Security team packaged OSV-Scanner as a snap so users can make use of the tool on Ubuntu as well.   

“With the move towards containerisation, it is important to enable accurate vulnerability scanning of container images using Ubuntu. Having USNs available in OSV.dev unlocks OSV-Scanner to scan Ubuntu-based container images for known vulnerabilities. We look forward to working further on extending OSV-Scanner’s capabilities scanning Ubuntu-based container images in the future” said Oliver Chang from the OSV team.

With this data available, OSV-Scanner will soon be able to provide an automated remediation path for vulnerabilities in Ubuntu containers by pointing to a publicly available fix or a fix available in Ubuntu Pro.

Learn more about:

Related posts


Michelle Anne Tabirao
2 April 2025

How does MongoDB work?

Data Platform Article

Explore what MongoDB is, how it functions, and how organizations utilize it for specific applications to achieve business benefits. ...


Hugo Huang
31 March 2025

Securing Software Supply Chains: New Research Highlights Industry Vulnerabilities

Security Article

New IDC study, co-sponsored by Canonical and Google Cloud, reveals the challenges and opportunities for organizations securing their software supply chains. Today, Canonical and Google Cloud released findings from a joint research project conducted by the International Data Corporation (IDC) that sheds light on the critical challenges org ...


Rajan Patel
31 March 2025

Automated patching for the Linux kernel

Security Article

To start securely and efficiently, Linux systems follow a carefully orchestrated sequence of steps to initialize firmware and manage services. Applying security patches to the software responsible for some of these early steps of Linux startup often requires a full system reboot. Frequent reboots driven by unplanned critical patching is d ...