1 00:00:01,170 --> 00:00:04,519 covering the week's top textbooks like 2 00:00:04,519 --> 00:00:04,529 covering the week's top textbooks like 3 00:00:04,529 --> 00:00:07,310 covering the week's top textbooks like Linux bias canonical has published new 4 00:00:07,310 --> 00:00:07,320 Linux bias canonical has published new 5 00:00:07,320 --> 00:00:09,770 Linux bias canonical has published new Ubuntu Linux kernel security updates for 6 00:00:09,770 --> 00:00:09,780 Ubuntu Linux kernel security updates for 7 00:00:09,780 --> 00:00:11,660 Ubuntu Linux kernel security updates for all of its supported releases to patch 8 00:00:11,660 --> 00:00:11,670 all of its supported releases to patch 9 00:00:11,670 --> 00:00:12,950 all of its supported releases to patch several vulnerabilities discovered 10 00:00:12,950 --> 00:00:12,960 several vulnerabilities discovered 11 00:00:12,960 --> 00:00:16,450 several vulnerabilities discovered lately by various security researchers 12 00:00:16,450 --> 00:00:16,460 lately by various security researchers 13 00:00:16,460 --> 00:00:19,220 lately by various security researchers affecting Linux four point one five four 14 00:00:19,220 --> 00:00:19,230 affecting Linux four point one five four 15 00:00:19,230 --> 00:00:21,109 affecting Linux four point one five four point four and five point three kernels 16 00:00:21,109 --> 00:00:21,119 point four and five point three kernels 17 00:00:21,119 --> 00:00:23,450 point four and five point three kernels and several versions of Ubuntu Linux the 18 00:00:23,450 --> 00:00:23,460 and several versions of Ubuntu Linux the 19 00:00:23,460 --> 00:00:25,640 and several versions of Ubuntu Linux the new security patch fixes an issue found 20 00:00:25,640 --> 00:00:25,650 new security patch fixes an issue found 21 00:00:25,650 --> 00:00:28,250 new security patch fixes an issue found in the Intel Wi-Fi driver a race 22 00:00:28,250 --> 00:00:28,260 in the Intel Wi-Fi driver a race 23 00:00:28,260 --> 00:00:30,410 in the Intel Wi-Fi driver a race condition discovered in Linux kernels 24 00:00:30,410 --> 00:00:30,420 condition discovered in Linux kernels 25 00:00:30,420 --> 00:00:33,559 condition discovered in Linux kernels virtual terminal implementation a flaw 26 00:00:33,559 --> 00:00:33,569 virtual terminal implementation a flaw 27 00:00:33,569 --> 00:00:35,209 virtual terminal implementation a flaw discovered in the floppy driver and a 28 00:00:35,209 --> 00:00:35,219 discovered in the floppy driver and a 29 00:00:35,219 --> 00:00:37,309 discovered in the floppy driver and a race condition in the block IO tracing 30 00:00:37,309 --> 00:00:37,319 race condition in the block IO tracing 31 00:00:37,319 --> 00:00:39,860 race condition in the block IO tracing implementation all these issues could 32 00:00:39,860 --> 00:00:39,870 implementation all these issues could 33 00:00:39,870 --> 00:00:41,689 implementation all these issues could allow a local attacker to either crash 34 00:00:41,689 --> 00:00:41,699 allow a local attacker to either crash 35 00:00:41,699 --> 00:00:43,939 allow a local attacker to either crash the system or expose sensitive 36 00:00:43,939 --> 00:00:43,949 the system or expose sensitive 37 00:00:43,949 --> 00:00:46,669 the system or expose sensitive information the new kernel update also 38 00:00:46,669 --> 00:00:46,679 information the new kernel update also 39 00:00:46,679 --> 00:00:48,160 information the new kernel update also patches a stack buffer overflow 40 00:00:48,160 --> 00:00:48,170 patches a stack buffer overflow 41 00:00:48,170 --> 00:00:51,590 patches a stack buffer overflow discovered in the v host net driver this 42 00:00:51,590 --> 00:00:51,600 discovered in the v host net driver this 43 00:00:51,600 --> 00:00:53,389 discovered in the v host net driver this could allow a local attacker with the 44 00:00:53,389 --> 00:00:53,399 could allow a local attacker with the 45 00:00:53,399 --> 00:00:57,319 could allow a local attacker with the ability to perform ioctl calls on dev v 46 00:00:57,319 --> 00:00:57,329 ability to perform ioctl calls on dev v 47 00:00:57,329 --> 00:00:59,889 ability to perform ioctl calls on dev v host net to cause a denial of service 48 00:00:59,889 --> 00:00:59,899 host net to cause a denial of service 49 00:00:59,899 --> 00:01:02,809 host net to cause a denial of service crashing the system that's just to name 50 00:01:02,809 --> 00:01:02,819 crashing the system that's just to name 51 00:01:02,819 --> 00:01:04,700 crashing the system that's just to name a few of the critical security issues 52 00:01:04,700 --> 00:01:04,710 a few of the critical security issues 53 00:01:04,710 --> 00:01:07,069 a few of the critical security issues that have been patched canonical urges 54 00:01:07,069 --> 00:01:07,079 that have been patched canonical urges 55 00:01:07,079 --> 00:01:09,050 that have been patched canonical urges all users to update their installations 56 00:01:09,050 --> 00:01:09,060 all users to update their installations 57 00:01:09,060 --> 00:01:11,029 all users to update their installations and install the new kernel versions as 58 00:01:11,029 --> 00:01:11,039 and install the new kernel versions as 59 00:01:11,039 --> 00:01:14,179 and install the new kernel versions as soon as possible new kernel versions are 60 00:01:14,179 --> 00:01:14,189 soon as possible new kernel versions are 61 00:01:14,189 --> 00:01:16,370 soon as possible new kernel versions are also available for raspberry pi devices 62 00:01:16,370 --> 00:01:16,380 also available for raspberry pi devices 63 00:01:16,380 --> 00:01:18,620 also available for raspberry pi devices cloud environments om processors 64 00:01:18,620 --> 00:01:18,630 cloud environments om processors 65 00:01:18,630 --> 00:01:21,529 cloud environments om processors Snapdragon processors as well as Amazon 66 00:01:21,529 --> 00:01:21,539 Snapdragon processors as well as Amazon 67 00:01:21,539 --> 00:01:23,480 Snapdragon processors as well as Amazon Web Services Microsoft Azure cloud 68 00:01:23,480 --> 00:01:23,490 Web Services Microsoft Azure cloud 69 00:01:23,490 --> 00:01:26,029 Web Services Microsoft Azure cloud Oracle cloud Google cloud platform and 70 00:01:26,029 --> 00:01:26,039 Oracle cloud Google cloud platform and 71 00:01:26,039 --> 00:01:29,959 Oracle cloud Google cloud platform and Google container engine systems keep in 72 00:01:29,959 --> 00:01:29,969 Google container engine systems keep in 73 00:01:29,969 --> 00:01:31,700 Google container engine systems keep in mind when updating a production system 74 00:01:31,700 --> 00:01:31,710 mind when updating a production system 75 00:01:31,710 --> 00:01:33,830 mind when updating a production system that a system reboot is required for the 76 00:01:33,830 --> 00:01:33,840 that a system reboot is required for the 77 00:01:33,840 --> 00:01:36,139 that a system reboot is required for the security issues to be corrected so it's 78 00:01:36,139 --> 00:01:36,149 security issues to be corrected so it's 79 00:01:36,149 --> 00:01:38,060 security issues to be corrected so it's best to schedule a short downtime to 80 00:01:38,060 --> 00:01:38,070 best to schedule a short downtime to 81 00:01:38,070 --> 00:01:41,149 best to schedule a short downtime to perform this update