Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 28 September 2017

Security Team Weekly Summary: September 27, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]

During the last week, the Ubuntu Security team:

  • Triaged 296 public security vulnerability reports, retaining the 81 that applied to Ubuntu.
  • Published 16 Ubuntu Security Notices which fixed 37 security issues (CVEs) across 18 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Updates to Community Supported Packages

  • Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for jython (LP: #1714728)

Development

  • review
    • udisks2 PR 3931
    • snap-confile calls snap-update-ns PR 3621
    • bind mount relative to snap-confine PR 3956
    • snaps on NFS support
  • completed: create PR 3937 to use only ‘udevadm trigger –action=change’ instead of ‘udevadm control –reload-rules’
  • update snap-confine to unconditional add the nvidia devices to the device cgroup and rely only on apparmor for mediation
  • wrote/tested libseccomp-golang changes to complement the libseccomp changes: https://github.com/seccomp/libseccomp-golang/pull/29

  • uploaded libseccomp, with the most minimal change needed to support snapd, to artful after receiving a Feature Freeze exception

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


Henry Coggill
6 June 2025

What is CMMC compliance?

Hardening Article

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public sector and amongst wider industry partners. ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...