Skip to main content
  1. Blog
  2. Article

Canonical
on 14 December 2017

Security Team Weekly Summary: December 14, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 213 public security vulnerability reports, retaining the 65 that applied to Ubuntu.
  • Published 15 Ubuntu Security Notices which fixed 16 security issues (CVEs) across 15 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • review tools testsuite updates for resquashfs
  • write-up processes for reviewing base snaps
  • send up PR 4375 and PR 4375 (2.30) to add an app/hook-specific udev rule for hotplugging (fixes mir hotplug issue)
  • debug chromium mknod issue with nvidia GPUs
  • send up PR 4359 and PR 4360 (2.30) policy updates PRs
  • add missing rule to upstream AppArmor fonts abstraction

  • pickup PR 4100 and send up PR 4383 (2.30) for new ssh/gpg keys interfaces
  • send up PR 4366 and PR 4367 (2.30) for small removable-media fix
  • update review-tools for 2.30 interfaces
  • discuss options for possible biometrics interface
  • snapd reviews
    • PR 4365 – allow wayland socket and non-root sockets/wayland slot policy
    • PR 4140 – add an interface for gnome-online-accounts D-Bus service
    • PR 4369 – add write permission to optical-drive interface
  • https://forum.snapcraft.io/t/proposal-to-disable-squashfs-fragments-in-snaps/3103

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


ijlal-loutfi
23 March 2026

Hot code burns

Ubuntu Article

Zero CVEs doesn’t mean secure. It means unexamined. New code has zero CVEs because no one has studied it yet, and if you’re rebuilding nightly from upstream, you’re signing first and asking questions later. In software supply chain security, the freshest code isn’t always the safest. Sometimes the most secure component in your pipeline is ...


Canonical
23 March 2026

Canonical joins the Rust Foundation as a Gold Member

Canonical announcements Article

Canonical’s Gold-level investment in the Rust Foundation supports the long-term health of the Rust programming language and highlights its growing role in building resilient systems on Ubuntu and beyond. AMSTERDAM, THE NETHERLANDS — March 23, 2026 (Open Source SecurityCon, KubeCon Europe 2026) — Today Canonical announced that it has joine ...


Canonical
20 March 2026

Canonical partners with Snyk for scanning chiseled Ubuntu containers

Canonical announcements Article

Canonical, the publisher of Ubuntu, is pleased to announce a new partnership with developer-focused cybersecurity company Snyk. Snyk Container, Snyk’s container security solution, now offers native support for scanning chiseled Ubuntu containers. This partnership will create a path to a more secure container ecosystem, where developers wi ...