Skip to main content
  1. Blog
  2. Article

Canonical
on 22 March 2017

Webinar: How to ensure the ongoing security compliance of Ubuntu 12.04


Many enterprises still run Ubuntu 12.04 LTS but updates will end soon.

Ubuntu 12.04 LTS users are encouraged to upgrade to 14.04 LTS or 16.04 LTS. For some this is easy but for others, particularly for larger deployments, upgrading can be complex.

Watch this on-webinar to learn:

  • How Ubuntu 12.04 LTS users will be impacted after April 28th, 2017
  • Upgrading strategies for 12.04 LTS systems to 14.04 LTS or 16.04 LTS
  • How to extend security maintenance for 12.04 LTS with Ubuntu Advantage

There’s also an interesting Q&A discussion at the end.

Watch the webinar

Related posts


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...


Luci Stanescu
8 May 2026

Dirty Frag Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

Two local privilege escalation (LPE) vulnerabilities affecting the Linux kernel have been publicly disclosed on May 7, 2026. One of the vulnerabilities has been assigned the ID: CVE-2026-43284. The other CVE ID is pending. Both are referred to as “Dirty Frag.” The affected components are Linux kernel modules. The first vulnerability impac ...


Luci Stanescu
30 April 2026

Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on April 29, 2026. The vulnerability has been assigned CVE ID CVE-2026-31431 and is referred to as Copy Fail. The affected component is a kernel module that provides hardware-accelerated cryptographic functions: algif_aead. The vulnerab ...