Security Team Weekly Summary: August 24, 2017
Canonical
on 24 August 2017

The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.
If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com
During the last week, the Ubuntu Security team:
- Triaged 195 public security vulnerability reports, retaining the 42 that applied to Ubuntu.
- Published 13 Ubuntu Security Notices which fixed 54 security issues (CVEs) across 16 supported packages.
Ubuntu Security Notices
Bug Triage
Mainline Inclusion Requests
-
pcp (LP: #1700827) completed
-
websockify (LP: #1108935) underway
-
MIR backlog: https://bugs.launchpad.net/~ubuntu-security/+assignedbugs?field.searchtext=%5BMIR%5D
Development
- add wayland interface spread test
- verify wayland interface with sway and weston
- reviews for snapd: solus, broadcom-asic-control interface, udev tagging, bluez implicit classic)
- continue/propose desktop, accessibility and desktop-input interfaces
- lots of discussion with snappy team regarding auto-connectable content snaps
- fix apparmor ‘ux’ warning with lxd snap
- miscellaneous policy updates (some in response to chromium snap call for testing)
- review tools updates for new interfaces
What the Security Team is Reading This Week
-
Random Thoughts by Rich Salz
Weekly Meeting
More Info
Talk to us today
Interested in running Ubuntu in your organisation?
Newsletter signup
Related posts
Intentional leadership at Canonical
In this article, Keirthana TS, a Senior Technical Author at Canonical, breaks down what leadership means to her and how she understood the power of...
Ubuntu Pro comes to Nutanix bare-metal Kubernetes
Nutanix and Canonical expand partnership to offer more choice for containerized workloads Enterprise Kubernetes® is maturing into a highly flexible,...
RISC-V 101 – what is it and what does it mean for Canonical?
In this blog I will look at some of the drivers for the growth of RISC-V, its value proposition and explain why supporting RISC-V is important to Canonical.