Differences between revisions 46 and 56 (spanning 10 versions)
Revision 46 as of 2018-08-14 18:16:15
Size: 4623
Editor: tyhicks
Comment: Add L1TF
Revision 56 as of 2020-07-29 19:18:12
Size: 6141
Editor: seth-arnold
Comment: add link to boothole
Deletions are marked like this. Additions are marked like this.
Line 29: Line 29:
 * [[ | runC / Privileged Container Escape (CVE-2019-5736)]]
 * [[ | Snap Socket Parsing (CVE-2019-7304)]]
 * [[ | Microarchitectural Data Sampling (MDS) (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091)]]
 * [[ | SACK Panic and Other TCP Denial of Service Issues (CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479)]]
 * [[ | Kubernetes API Server Vulnerability (CVE-2019-11247) ]]
 * [[ | HTTP/2 Denial of Service Vulnerabilities ]]
 * [[ | TSX Asynchronous Abort (TAA, CVE-2019-11135), Intel® Processor Machine Check Error (MCEPSC, CVE-2018-12207), and i915 graphics (CVE-2019-0155, CVE-2019-0154) vulnerabilities]]
 * [[ | Special Register Buffer Data Sampling (SRBDS) Hardware Vulnerability in Intel CPUs (CVE-2020-0543, aka Crosstalk)]]
 * [[ | GRUB2 Secure Boot Bypass (CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705, CVE-2020-15706, CVE-2020-15707, aka BootHole)]]

Security updates


Media coverage

In order to stay secure, Ubuntu users should simply apply all Ubuntu security updates to their systems when they become available.

For some vulnerabilities that are highlighted by the media, we've provided additional information as part of our KnowledgeBase:

Vulnerability Resources

Update processes

Update techniques






SecurityTeam/KnowledgeBase (last edited 2020-11-10 19:22:20 by seth-arnold)