Security Team Weekly Summary: December 14, 2017

Canonical

on 14 December 2017

This article is more than 7 years old.


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 213 public security vulnerability reports, retaining the 65 that applied to Ubuntu.
  • Published 15 Ubuntu Security Notices which fixed 16 security issues (CVEs) across 15 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • review tools testsuite updates for resquashfs
  • write-up processes for reviewing base snaps
  • send up PR 4375 and PR 4375 (2.30) to add an app/hook-specific udev rule for hotplugging (fixes mir hotplug issue)
  • debug chromium mknod issue with nvidia GPUs
  • send up PR 4359 and PR 4360 (2.30) policy updates PRs
  • add missing rule to upstream AppArmor fonts abstraction

  • pickup PR 4100 and send up PR 4383 (2.30) for new ssh/gpg keys interfaces
  • send up PR 4366 and PR 4367 (2.30) for small removable-media fix
  • update review-tools for 2.30 interfaces
  • discuss options for possible biometrics interface
  • snapd reviews
    • PR 4365 – allow wayland socket and non-root sockets/wayland slot policy
    • PR 4140 – add an interface for gnome-online-accounts D-Bus service
    • PR 4369 – add write permission to optical-drive interface
  • https://forum.snapcraft.io/t/proposal-to-disable-squashfs-fragments-in-snaps/3103

What the Security Team is Reading This Week

Weekly Meeting

More Info

Ubuntu cloud

Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

How we used Flask and 12-factor charms to simplify Canonical.com development

Learn how Canonical is using Python Flask and the 12-factor charm framework to simplify the development of Canonical.com and Ubuntu.com

Web Engineering: Hack Week 2024

At Canonical, the work of our teams is strongly embedded in the open source principles and philosophy. We believe open source software will become the most...

What to know when procuring Linux laptops

Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your...