Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 7 December 2017

Security Team Weekly Summary: December 7, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]

Due to the holiday last week, there was no weekly report, so this report covers the previous two weeks. During the last two weeks, the Ubuntu Security team:

  • Triaged 379 public security vulnerability reports, retaining the 74 that applied to Ubuntu.
  • Published 32 Ubuntu Security Notices which fixed 70 security issues (CVEs) across 34 supported packages.

Ubuntu Security Notices

 

Bug Triage

 

Mainline Inclusion Requests

 

Development

 

  • add max compressed size check to the review tools
  • adjust review-tools runtime errors output for store (final)
  • adjust review-tools for redflagged base snap overrides
  • adjust review-tools for resquashing with fakeroot
  • upload a couple of bad snaps to test r945 of the review tools in the store. The store is correctly not auto-approving, but is also not handling them right. File LP: #1733699
  • investigate SNAPCRAFT_BUILD_INFO=1 with snapcraft cleanbuild and attempt rebuilds
  • respond to feedback in PR 4245, close and resubmit as PR 4255 (interfaces/screen-inhibit-control: fix case in screen inhibit control)
  • investigate reported godot issue. Send up PR 4257 (interfaces/opengl: also allow ‘revision’ on /sys/devices/pci…)
  • investigation of potential biometrics-observe interface
  • snapd reviews
    • PR 4258: fix unmounting on systems without rshared
    • PR 4170: cmd/snap-update-ns: add planWritableMimic
    • PR 4306 (use #include instead of bare ‘include’)
    • PR 4224 – cmd/snap-update-ns: teach update logic to handle synthetic changes
    • PR 4312 – ‘create mount targe for lib32,vulkan on demand
    • PR 4323 – interfaces: add gpio-memory-control interface
    • PR 4325 (add test for netlink-connector interface) and investigate NETLINK_CONNECTOR denials
    • review design of PR 4329 – discard stale mountspaces (v2)
  • finalized squashfs fix for 1555305 and submitted it upstream (https://sourceforge.net/p/squashfs/mailman/message/36140758/)

  • investigation into users 16.04 apparmor issues with tomcat

What the Security Team is Reading This Week

 

Weekly Meeting

 

More Info

 

Related posts


Lech Sandecki
23 October 2024

6 facts for CentOS users who are holding on

Cloud and server Article

Considering migrating to Ubuntu from other Linux platforms, such as CentOS? Find six useful facts to get started! ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...