Security Team Weekly Summary: November 16, 2017
Canonical
on 16 November 2017
The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.
If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com
During the last week, the Ubuntu Security team:
- Triaged 149 public security vulnerability reports, retaining the 50 that applied to Ubuntu.
- Published 5 Ubuntu Security Notices which fixed 21 security issues (CVEs) across 5 supported packages.
Ubuntu Security Notices
Bug Triage
Mainline Inclusion Requests
-
spice-vdagent underway (LP: #1200296)
-
MIR backlog: https://bugs.launchpad.net/~ubuntu-security/+assignedbugs?field.searchtext=%5BMIR%5D
Development
- (snapd) submitted fix for for /dev/pts slave EPERM fix – PR 4159 and 4160 (2.29)
- (snapd) submitted fix for modprobe failure causing all security backends to fail – PR 4162
- (snapd) submitted fix for raw-usb udev_enumerate issue – PR 4164 and 4165 (2.29)
- (snapd) created policy-updates-xxxii PR for master (PR 4180) and 2.29 (PR 4181), coordinate with snapd team. Among other things, this has a workaround rule for the above electron denial
- (snapd) submitted ‘add test-policy-app spread test’ – PR 4157
- updated eCryptfs -next branch for linux-next testing and got it ready to create a 4.15 pull request
- snapd reviews
- ‘fix udev tagging for hooks’ – PR 4144
- ‘drop group filter from seccomp rules’ PR 4185
- ‘support bash as base runtime’ PR 4197
-
landed documentation for the new (Linux 4.14) seccomp dynamic logging support in the upstream Linux man-pages project: 1, 2, 3, 4
What the Security Team is Reading This Week
Weekly Meeting
More Info
Talk to us today
Interested in running Ubuntu in your organisation?
Newsletter signup
Related posts
What is System Hardening? Essential Checklists from OS to Applications
Hardening a system aims to decrease its exposure to make it difficult to hack, and to lessen the potential collateral damage in the event of a compromise.
Rsync remote code execution and related vulnerability fixes available
Canonical’s security team has released updates of the rsync packages for all supported Ubuntu releases. The updates remediate CVE-2024-12084, CVE-2024-12085,...
Needrestart local privilege escalation vulnerability fixes available
Qualys discovered vulnerabilities which allow a local attacker to gain root privileges in the needrestart package (CVE-2024-48990, CVE-2024-48991,...