Skip to main content
  1. Blog
  2. Article

Canonical
on 21 December 2017

Security Team Weekly Summary: December 21, 2017


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: ubuntu-hardened@lists.ubuntu.com

During the last week, the Ubuntu Security team:

  • Triaged 301 public security vulnerability reports, retaining the 47 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 3 security issues (CVEs) across 7 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • Disable squashfs fragments in snap
  • PR 4387 – explicitly deny ~/.gnupg/random_seed in gpg-keys interface
  • Submitted PR 4399 for rewrite snappy-app-dev in Go
  • Created PR 4406 – interfaces/dbus: adjust slot policy for listen, accept and accept4 syscalls
  • Reviews
    • PR 4365 – wayland slot implementation

What the Security Team is Reading This Week

Weekly Meeting

More Info

Related posts


ilvipero
6 May 2026

Three weeks to go: A sneak peek of the Ubuntu Summit 26.04 experience

Ubuntu Article

The countdown to the Ubuntu Summit is officially on! We are just three weeks away from Ubuntu Summit 26.04, and the orange energy levels in our community channels are peaking. We’ve been reviewing the talk submissions, and have been blown away by the passion and creativity of our circle of friends. Once again, the schedule ...


Rajan Patel
4 May 2026

How to use Ubuntu on Windows

Ubuntu Article

Why run Ubuntu on Windows? It’s about getting the best of both worlds. ...


Luci Stanescu
30 April 2026

Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on April 29, 2026. The vulnerability has been assigned CVE ID CVE-2026-31431 and is referred to as Copy Fail. The affected component is a kernel module that provides hardware-accelerated cryptographic functions: algif_aead. The vulnerab ...