Iran · Ars Technica
Ubuntu and Canonical infrastructure went down hours after researchers launched potent exploit code that allowed untrusted
Compiled by KHAO Editorial — aggregated from 1 outlet. See llms.txt for citation guidance.
◌ Single Source
The outage has limited Ubuntu’s ability to communicate security guidance to affected users.
Key facts
- Attempts to connect to most Ubuntu and Canonical webpages and download OS updates from Ubuntu servers have consistently failed over the past 24 hours
- Updates from mirror sites, however, have continued to work normally
- A group sympathetic to the Iranian government has taken credit for the outage
- In recent days, the same pro-Iran group has taken credit for DDoSes on eBay
Summary
Servers operated by Ubuntu and its parent company Canonical were knocked offline on Thursday morning and have remained down ever since, a situation that’s preventing the OS provider from communicating normally following the botched disclosure of a major vulnerability. Attempts to connect to most Ubuntu and Canonical webpages and download OS updates from Ubuntu servers have consistently failed over the past 24 hours. A group sympathetic to the Iranian government has taken credit for the outage. According to a moderator on AskUbuntu.com, URLs that remained unavailable include:. Ubuntu Security API, CVEs.