Security Team Weekly Summary: November 16, 2017
Canonical
on 16 November 2017
The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.
If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com
During the last week, the Ubuntu Security team:
- Triaged 149 public security vulnerability reports, retaining the 50 that applied to Ubuntu.
- Published 5 Ubuntu Security Notices which fixed 21 security issues (CVEs) across 5 supported packages.
Ubuntu Security Notices
Bug Triage
Mainline Inclusion Requests
-
spice-vdagent underway (LP: #1200296)
-
MIR backlog: https://bugs.launchpad.net/~ubuntu-security/+assignedbugs?field.searchtext=%5BMIR%5D
Development
- (snapd) submitted fix for for /dev/pts slave EPERM fix – PR 4159 and 4160 (2.29)
- (snapd) submitted fix for modprobe failure causing all security backends to fail – PR 4162
- (snapd) submitted fix for raw-usb udev_enumerate issue – PR 4164 and 4165 (2.29)
- (snapd) created policy-updates-xxxii PR for master (PR 4180) and 2.29 (PR 4181), coordinate with snapd team. Among other things, this has a workaround rule for the above electron denial
- (snapd) submitted ‘add test-policy-app spread test’ – PR 4157
- updated eCryptfs -next branch for linux-next testing and got it ready to create a 4.15 pull request
- snapd reviews
- ‘fix udev tagging for hooks’ – PR 4144
- ‘drop group filter from seccomp rules’ PR 4185
- ‘support bash as base runtime’ PR 4197
-
landed documentation for the new (Linux 4.14) seccomp dynamic logging support in the upstream Linux man-pages project: 1, 2, 3, 4
What the Security Team is Reading This Week
Weekly Meeting
More Info
Ubuntu cloud
Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.
Newsletter signup
Related posts
Needrestart local privilege escalation vulnerability fixes available
Qualys discovered vulnerabilities which allow a local attacker to gain root privileges in the needrestart package (CVE-2024-48990, CVE-2024-48991,...
6 facts for CentOS users who are holding on
Considering migrating to Ubuntu from other Linux platforms, such as CentOS? Find six useful facts to get started!
CUPS Remote Code Execution Vulnerability Fix Available
Four CVE IDs have been assigned that together form an high-impact exploit chain surrounding CUPS: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176 and...