Skip to main content
  1. Blog
  2. Article

Canonical
on 9 November 2017

Security Team Weekly Summary: November 9, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 201 public security vulnerability reports, retaining the 45 that applied to Ubuntu.
  • Published 13 Ubuntu Security Notices which fixed 33 security issues (CVEs) across 16 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Updates to Community Supported Packages

  • Lucas Kocia (lkocia) provided a debdiff for xenial for firewalld (LP: #1617617)

  • Jeremy Bicha (jbicha) provided a debdiff for zesty for gdm3 (LP: #1729354)

Development

  • fixed last of snappy-debug updates (handle core vs classic policy), test, push to stable
  • reviews
    • PR 4105 – i386/socket/trusty testsuite fix
    • review apparmor.d man page patch from jj
    • PR 4109 – fix parsing of mountinfo fields
    • PRs 4123 and 4124 – fix bug in ofono interface
    • PR 4136 – snap-confine apparmor policy bug
  • https://forum.snapcraft.io/t/device-cgroup-is-applied-to-devmode-snap/2663

  • documented the content interface wrt shared libraries to follow store guidelines for cross-publisher sharing.
  • documented auto-connection for a specific plugging snap to a specific slotting snap
  • documented errno for different security backends
  • 1724785
  • PR 4114 don’t udev tag with devmode/classic snaps
  • PR 4115 udev tag serial-port interface with only path attribute
  • PR 4116 udev tag hidraw interface with only path attribute
  • PR 4127 don’t udev tag but add /dev/uhid to device cgroup
  • PRs 4131-4134 for 2.29
  • Migrated AppArmor to GitLab: https://gitlab.com/apparmor

  • [Work-in-progress] AppArmor support for multiple policy cache directories: apparmor/apparmor!4

  • Simplified usage of libapparmor cleanup functions by preserving errno: apparmor/apparmor!6

  • Landed upstream libseccomp changes to support new dynamic seccomp logging: seccomp/libseccomp#92

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


Abdelrahman Hosny
21 May 2026

Developing web apps with local LLM inference

AI Article

I’ve yet to meet a developer that enjoys working with metered AI APIs. The need to pay for every API call in development works in direct opposition to the ethos of rapid iteration, and it’s easy for the costs to get out of hand. That’s why Canonical has created a different approach to building AI-powered ...


Luci Stanescu
21 May 2026

PinTheft Linux kernel vulnerability mitigation

Ubuntu Article

A local privilege escalation (LPE) security vulnerability in the Linux kernel, codename “PinTheft,” was publicly disclosed on May 19, 2026. The vulnerability was fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published along with public disclosure. The vulnerability does not have a CVE ID assigned at the moment; o ...


Luci Stanescu
19 May 2026

CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations

Ubuntu Article

An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referr ...