Security Team Weekly Summary: November 16, 2017

Canonical

Canonical

on 16 November 2017

 

The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 149 public security vulnerability reports, retaining the 50 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 21 security issues (CVEs) across 5 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • (snapd) submitted fix for for /dev/pts slave EPERM fix – PR 4159 and 4160 (2.29)
  • (snapd) submitted fix for modprobe failure causing all security backends to fail – PR 4162
  • (snapd) submitted fix for raw-usb udev_enumerate issue – PR 4164 and 4165 (2.29)
  • (snapd) created policy-updates-xxxii PR for master (PR 4180) and 2.29 (PR 4181), coordinate with snapd team. Among other things, this has a workaround rule for the above electron denial
  • (snapd) submitted ‘add test-policy-app spread test’ – PR 4157
  • updated eCryptfs -next branch for linux-next testing and got it ready to create a 4.15 pull request
  • snapd reviews
    • ‘fix udev tagging for hooks’ – PR 4144
    • ‘drop group filter from seccomp rules’ PR 4185
    • ‘support bash as base runtime’ PR 4197
  • landed documentation for the new (Linux 4.14) seccomp dynamic logging support in the upstream Linux man-pages project: 1234

What the Security Team is Reading This Week

Weekly Meeting

More Info

Ubuntu cloud

Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.

Sign up for email updates

Choose the topics you're interested in

 

Related posts

Trust and security in the Snap Store

Last Friday (11 May 2018) we learned that a snap was mining cryptocurrency in the background while the application was running. The practical implication of that is the overuse of local resources on a user’s system, well beyond what a…

Introducing developer notifications for snap security updates

For some time, we’ve wanted a mechanism to alert snap publishers to security updates which affect their snaps. All the pieces have come together and we are now sending alerts via email. Stated more precisely, publishers who use ‘stage-…

Meltdown, Spectre and Ubuntu: What you need to know

As details of the Meltdown and Spectre vulnerabilities1 have become clearer a number of statements have been published by the multiple vendors affected; Canonical has issued advisories and updates on fixes and mitigations, the latest of…