Security Team Weekly Summary: November 16, 2017

Canonical

on 16 November 2017

This article was last updated 5 years ago.


 

The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 149 public security vulnerability reports, retaining the 50 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 21 security issues (CVEs) across 5 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • (snapd) submitted fix for for /dev/pts slave EPERM fix – PR 4159 and 4160 (2.29)
  • (snapd) submitted fix for modprobe failure causing all security backends to fail – PR 4162
  • (snapd) submitted fix for raw-usb udev_enumerate issue – PR 4164 and 4165 (2.29)
  • (snapd) created policy-updates-xxxii PR for master (PR 4180) and 2.29 (PR 4181), coordinate with snapd team. Among other things, this has a workaround rule for the above electron denial
  • (snapd) submitted ‘add test-policy-app spread test’ – PR 4157
  • updated eCryptfs -next branch for linux-next testing and got it ready to create a 4.15 pull request
  • snapd reviews
    • ‘fix udev tagging for hooks’ – PR 4144
    • ‘drop group filter from seccomp rules’ PR 4185
    • ‘support bash as base runtime’ PR 4197
  • landed documentation for the new (Linux 4.14) seccomp dynamic logging support in the upstream Linux man-pages project: 1234

What the Security Team is Reading This Week

Weekly Meeting

More Info

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Update Livepatch Client for the newest kernel module signing certificate

The kernel engineering team at Canonical has generated a new module signing certificate on May 16, 2025, and it is embedded in all Ubuntu kernels published...

How is Livepatch safeguarded against bad actors?

What safeguards the Livepatch security patching solution against bad actors and malicious code masquerading as an update? Learn about Secure Boot and module signing.

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability...