From 3f662e084247a572f38966d21063992aab5126ea Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Mon, 7 Oct 2024 17:55:35 +0200 Subject: [PATCH] Update copy --- templates/security/cves/about.html | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/templates/security/cves/about.html b/templates/security/cves/about.html index cd27bab3cad..b93d9c832dd 100644 --- a/templates/security/cves/about.html +++ b/templates/security/cves/about.html @@ -221,7 +221,7 @@

Require Ubuntu Pro

Here are the guidelines that we generally use to assess the Ubuntu priority of a CVE. There may be cases in which we assign a priority level based on factors not accounted for in these guidelines. These priority levels are distinct from other published severity levels such as CVSS base scores, either ours or from other sources such as those used in the - National Vulnerability Database. + National Vulnerability Database (NVD). Learn more about how we prioritise CVEs.

@@ -230,7 +230,7 @@

Require Ubuntu Pro

Critical @@ -238,7 +238,7 @@

Require Ubuntu Pro

High @@ -246,7 +246,7 @@

Require Ubuntu Pro

Medium @@ -255,6 +255,7 @@

Require Ubuntu Pro

@@ -263,6 +264,7 @@

Require Ubuntu Pro

- A very damaging problem, typically exploitable for nearly all users in a default installation of Ubuntu. Includes remote root privilege escalations and massive data loss. + A very damaging problem, typically exploitable for nearly all users in a default installation of Ubuntu. Includes remote root privilege escalations, remote data theft, and massive data loss.
- A significant problem, typically exploitable for nearly all users in a default installation of Ubuntu. Includes serious remote denial of services, local root privilege escalations, or data loss. + A significant problem, typically exploitable for nearly all users in a default installation of Ubuntu. Includes serious remote denial of service, local root privilege escalations, local data theft, and data loss.
- A significant problem, typically exploitable for many users. Includes network daemon denial of service attacks, cross-site scripting, and gaining user privileges. + A significant problem, typically exploitable for many users. Includes network daemon denial of service, cross-site scripting, and gaining user privileges.
A security problem, but hard to exploit due to the environment, requires a user-assisted attack, has a small install base, or does very little damage. + These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
Technically a security problem, but only theoretical in nature, requires a very special situation, has almost no install base, or does no real damage. + These typically will not receive security updates unless there is an easy fix and some other issue causes an update.