Security Team Weekly Summary: December 21, 2017
Canonical
on 21 December 2017
The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.
If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]
During the last week, the Ubuntu Security team:
- Triaged 301 public security vulnerability reports, retaining the 47 that applied to Ubuntu.
- Published 5 Ubuntu Security Notices which fixed 3 security issues (CVEs) across 7 supported packages.
Ubuntu Security Notices
Bug Triage
Mainline Inclusion Requests
-
libteam underway (LP: #1392012)
-
MIR backlog: https://bugs.launchpad.net/~ubuntu-security/+assignedbugs?field.searchtext=%5BMIR%5D
Development
- Disable squashfs fragments in snap
- prepared/tested/uploaded squashfs-tools fixes for 1555305 in bionic through trusty and did SRU paperwork
- PR 4387 – explicitly deny ~/.gnupg/random_seed in gpg-keys interface
- Submitted PR 4399 for rewrite snappy-app-dev in Go
- Created PR 4406 – interfaces/dbus: adjust slot policy for listen, accept and accept4 syscalls
- Reviews
- PR 4365 – wayland slot implementation
What the Security Team is Reading This Week
Weekly Meeting
More Info
Talk to us today
Interested in running Ubuntu in your organisation?
Newsletter signup
Related posts
Building an end-to-end Retrieval- Augmented Generation (RAG) workflow
In this guide, we will take you through setting up a RAG pipeline. We will utilize open source tools such as Charmed OpenSearch for efficient search retrieval...
vBRAS NFVI reference architecture with Huawei OceanStor and Canonical OpenStack
A broadband remote access server (BRAS) is an access gateway oriented to broadband network applications. It bridges broadband access and backbone networks,...
Canonical + thanks.dev = giving back to open source developers
Canonical has committed to donating US$120,000 to open source developers over the next 12 months (using thanks.dev).