Skip to main content
  1. Blog
  2. Article

Canonical
on 21 December 2017

Security Team Weekly Summary: December 21, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]

During the last week, the Ubuntu Security team:

  • Triaged 301 public security vulnerability reports, retaining the 47 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 3 security issues (CVEs) across 7 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • Disable squashfs fragments in snap
  • PR 4387 – explicitly deny ~/.gnupg/random_seed in gpg-keys interface
  • Submitted PR 4399 for rewrite snappy-app-dev in Go
  • Created PR 4406 – interfaces/dbus: adjust slot policy for listen, accept and accept4 syscalls
  • Reviews
    • PR 4365 – wayland slot implementation

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


Massimiliano Gori
27 March 2026

Modern Linux identity management: from local auth to the cloud with Ubuntu

Cloud and server Article

The modern enterprise operates in a hybrid world where on-premises infrastructure coexists with cloud services, and security threats evolve daily. IT administrators are tasked with a difficult balancing act: maintaining traditional local workflows while managing the inevitable shift toward cloud-native architectures. Identity has emerged ...


Abdelrahman Hosny
24 March 2026

Canonical welcomes NVIDIA’s donation of the GPU DRA driver to CNCF

Partners Article

At KubeCon Europe in Amsterdam, NVIDIA announced that it will donate the GPU Dynamic Resource Allocation (DRA) Driver to the Cloud Native Computing Foundation (CNCF). This marks an important milestone for the Kubernetes ecosystem and for the future of AI infrastructure. For years, GPUs have been central to modern machine learning and high ...


ijlal-loutfi
23 March 2026

Hot code burns: the supply chain case for letting your containers cool before you ship

Ubuntu Article

Zero CVEs doesn’t mean secure. It means unexamined. New code has zero CVEs because no one has studied it yet, and if you’re rebuilding nightly from upstream, you’re signing first and asking questions later. In software supply chain security, the freshest code isn’t always the safest. Sometimes the most secure component in your pipeline is ...