Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 16 November 2017


 

The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]

During the last week, the Ubuntu Security team:

  • Triaged 149 public security vulnerability reports, retaining the 50 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 21 security issues (CVEs) across 5 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • (snapd) submitted fix for for /dev/pts slave EPERM fix – PR 4159 and 4160 (2.29)
  • (snapd) submitted fix for modprobe failure causing all security backends to fail – PR 4162
  • (snapd) submitted fix for raw-usb udev_enumerate issue – PR 4164 and 4165 (2.29)
  • (snapd) created policy-updates-xxxii PR for master (PR 4180) and 2.29 (PR 4181), coordinate with snapd team. Among other things, this has a workaround rule for the above electron denial
  • (snapd) submitted ‘add test-policy-app spread test’ – PR 4157
  • updated eCryptfs -next branch for linux-next testing and got it ready to create a 4.15 pull request
  • snapd reviews
    • ‘fix udev tagging for hooks’ – PR 4144
    • ‘drop group filter from seccomp rules’ PR 4185
    • ‘support bash as base runtime’ PR 4197
  • landed documentation for the new (Linux 4.14) seccomp dynamic logging support in the upstream Linux man-pages project: 1234

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


eslerm
19 November 2024

Needrestart local privilege escalation vulnerability fixes available

Ubuntu Article

Qualys discovered vulnerabilities which allow a local attacker to gain root privileges in the needrestart package (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, and CVE-2024-11003) and a related issue in libmodule-scandeps-perl (CVE-2024-10224). The vulnerabilities affect Debian, Ubuntu and other Linux distributions. Canonical’s securit ...


Lech Sandecki
23 October 2024

6 facts for CentOS users who are holding on

Cloud and server Article

Considering migrating to Ubuntu from other Linux platforms, such as CentOS? Find six useful facts to get started! ...


Luci Stanescu
26 September 2024

CUPS Remote Code Execution Vulnerability Fix Available

Ubuntu Article

Four CVE IDs have been assigned that together form an high-impact exploit chain surrounding CUPS: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176 and CVE-2024-47177. Canonical’s security team has released updates for the cups-browsed, cups-filters, libcupsfilters and libppd packages for all supported Ubuntu LTS releases. The updates remedi ...