20161121
2688
Comment:
|
2958
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
== Meeting (DRAFT) == | ## page was copied from MeetingLogs/Security/20160620 == Meeting == |
Line 3: | Line 4: |
* '''When''': Mon June 6th 2016 16:30 UTC * '''End''': 17:00 UTC |
* '''When''': Mon June 27th 2016 16:31 UTC * '''End''': 16:54 UTC |
Line 6: | Line 7: |
* '''Chaired By''': Jamie Strandboge (jdstrand) | * '''Chaired By''': Tyler Hicks (tyhicks) |
Line 12: | Line 13: |
* tyhicks | |
Line 15: | Line 17: |
* ratliff | |
Line 17: | Line 20: |
* tyhicks | * None |
Line 21: | Line 24: |
* I'd like to announce a couple of changes to the structure of the security team. * After almost 5.5 years as the manager of the security team, I decided it was time for a change. The security team is too awesome to leave so I'm not going far: I will stay on the security team as a generalist focusing on snappy initially and getting back to generalist duties in due course. :) * The other change is that I'd like to extend a warm welcome to Emily Ratliff (ratliff) for joining the Ubuntu Security team and I'll be working with her on a smooth transition. If you don't know Emily already, google her ;) She is very talented and accomplished and we are super-excited to have her join Canonical and the Ubuntu Security team. :) |
* Stefan Bader (smb) provided debdiffs for precise-xenial for xen * Otto Kekäläinen (otto) provided debdiffs for wily-xenial for mariadb-10.0 (LP: #1589302) |
Line 26: | Line 28: |
* snappy PR followups (gsettings, input methods) * snappy interface reviews (modem-manager, ppp, etc) * various snapd interface policy updates and investigations * review tools updates for upcoming snap.yaml changes and various bug fixes * im-config testing * docker interface as have time |
* Snappy dbus-bind interface * Snappy interfaces documentation * Work with morphis on testing/sponsoring pulseaudio SRU for disabling recording if snap policy (ie, finish phase 1) |
Line 33: | Line 32: |
* weekly role: cve triage | * weekly role: CVE triage * tomcat updates * patch piloting |
Line 35: | Line 36: |
* weekly role: bug triage {{{#!wiki comment |
* weekly role: happy place * kernel USNs * sponsor kinit update * watch for doko's yakkety test rebuild and fix any PIE related build failures |
Line 38: | Line 41: |
* weekly role }}} |
* weekly role: community * !AppArmor upload and SRU * seccomp complain mode * embargoed issue |
Line 42: | Line 47: |
* finish IPC cross label validation fix for stacking * revise profile name validation checks * LXC/LXD use some characters that were planned to be blocked * prepare upstream kernel pull request for some of the Ubuntu !AppArmor delta * finish testing 4.7 !AppArmor rebase and handoff to the kernel team |
|
Line 43: | Line 53: |
* weekly role: happy place | * weekly role: bug triage * embargoed issue * MIR audits |
Line 45: | Line 57: |
* chromium-browser sponsoring * publish Oxide update * test oxide on arm64 and fix any bugs discovered * converged device [[https://blueprints.launchpad.net/oxide/+spec/converged-device-support|features]] for oxide * document instructions for doing flash updates |
|
Line 46: | Line 64: |
* Please welcome | * look into the Ubuntu CVE tracker |
Line 51: | Line 69: |
* none | * None |
Line 54: | Line 72: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-06-06-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-06-27-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon June 27th 2016 16:31 UTC
End: 16:54 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
ChrisCoulson
- ratliff
Not present
- None
Agenda
- Announcements
- Stefan Bader (smb) provided debdiffs for precise-xenial for xen
- Otto Kekäläinen (otto) provided debdiffs for wily-xenial for mariadb-10.0 (LP: #1589302)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- Snappy dbus-bind interface
- Snappy interfaces documentation
- Work with morphis on testing/sponsoring pulseaudio SRU for disabling recording if snap policy (ie, finish phase 1)
- mdeslaur
- weekly role: CVE triage
- tomcat updates
- patch piloting
- sbeattie
- weekly role: happy place
- kernel USNs
- sponsor kinit update
- watch for doko's yakkety test rebuild and fix any PIE related build failures
- tyhicks
- weekly role: community
AppArmor upload and SRU
- seccomp complain mode
- embargoed issue
- jjohansen
focus on AppArmor (stacking bugs for 16.04)
- finish IPC cross label validation fix for stacking
- revise profile name validation checks
- LXC/LXD use some characters that were planned to be blocked
prepare upstream kernel pull request for some of the Ubuntu AppArmor delta
finish testing 4.7 AppArmor rebase and handoff to the kernel team
- sarnold
- weekly role: bug triage
- embargoed issue
- MIR audits
ChrisCoulson
- chromium-browser sponsoring
- publish Oxide update
- test oxide on arm64 and fix any bugs discovered
converged device features for oxide
- document instructions for doing flash updates
- ratliff
- look into the Ubuntu CVE tracker
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-06-27-16.31.moin.txt
MeetingLogs/Security/20161121 (last edited 2016-11-21 16:51:19 by tyhicks)