Security Team Weekly Summary: August 24, 2017

Canonical

on 24 August 2017

This article is more than 8 years old.


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 195 public security vulnerability reports, retaining the 42 that applied to Ubuntu.
  • Published 13 Ubuntu Security Notices which fixed 54 security issues (CVEs) across 16 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • snapd on Debian discussion

  • add wayland interface spread test
  • verify wayland interface with sway and weston
  • reviews for snapd: solus, broadcom-asic-control interface, udev tagging, bluez implicit classic)
  • continue/propose desktop, accessibility and desktop-input interfaces
  • lots of discussion with snappy team regarding auto-connectable content snaps
  • fix apparmor ‘ux’ warning with lxd snap
  • miscellaneous policy updates (some in response to chromium snap call for testing)
  • review tools updates for new interfaces
  • AppArmor pull request for next (4.14)

What the Security Team is Reading This Week

Weekly Meeting

More Info

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Canonical welcomes NVIDIA’s donation of the GPU DRA driver to CNCF

At KubeCon Europe in Amsterdam, NVIDIA announced that it will donate the GPU Dynamic Resource Allocation (DRA) Driver to the Cloud Native Computing Foundation...

Hot code burns: the supply chain case for letting your containers cool before you ship

Zero CVEs doesn’t mean secure. It means unexamined. New code has zero CVEs because no one has studied it yet, and if you’re rebuilding nightly from upstream,...

Canonical joins the Rust Foundation as a Gold Member

Canonical’s Gold-level investment in the Rust Foundation supports the long-term health of the Rust programming language and highlights its growing role in...