20170424

Differences between revisions 1 and 26 (spanning 25 versions)
Revision 1 as of 2017-01-09 17:24:01
Size: 2775
Editor: emilyr
Comment:
Revision 26 as of 2017-03-20 16:21:29
Size: 2792
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20161205 ## page was copied from MeetingLogs/Security/20170313
Line 4: Line 4:
 * '''When''': Mon Jan 9th 2017 16:30 UTC
 * '''End''': 16:49 UTC
 * '''When''': Mon Mar 20th 2017 16:31 UTC
 * '''End''': 16:48 UTC
Line 7: Line 7:
 * '''Chaired By''': Emily Ratliff (ratliff)  * '''Chaired By''': Tyler Hicks (tyhicks)
Line 10: Line 10:
 * jdstrand
 * mdeslaur
 * sbeattie
 * tyhicks
 * jjohansen
 * sarnold
Line 11: Line 17:
 * jdstrand
 * sbeattie
 * sarnold
Line 17: Line 20:
 * jjohansen
 * mdeslaur
 * tyhicks
 * none
Line 23: Line 24:
  * Andreas Cadhalpun provided debdiffs for xenial and yakkety for ffmpeg (LP: #1648265 LP: #1647226)   * None
Line 26: Line 27:
   * make sure ufw 0.35-3 gets into Debian and zesty (to fix a ftbfs due to an updated netbase which broke the testsuite). trunk is fixed and packages prepared/tested, just need to make sure they get everywhere
   * plan to continue to help Tyler and Emily with sprint preparation, feedback and outcomes as necessary
   * have several PR reviews and followups for snapd 2.21
   * organize snapd/policykit documents for future discussions
   * have a number of policy updates I'd like to have in place this week in time for snapd 2.21
   * work on seccomp arg filtering policy in earnest
   * review tools updates for recent issues
   * snappy PR reviews
   * store reviews
   * various policy updates
    * mir on dragonboard
   * seccomp arg filtering in snappy confinement policy
  * mdeslaur
   * weekly role: cve triage
   * security updates
Line 34: Line 38:
   * finish the ssh updates I was working on
   * look in more depth at the aslr/relocatable symbols stuff that came up
   * have a few kernel signoffs to do due to respins
   * try to pick up another update as well
   * glibc updates
   * look into QRT regressions/failures for the kernel team
   * security updates
  * tyhicks
   * weekly role: happy place
   * embargoed issue
   * propose design change for seccomp kernel patches and get out v5
   * design review
   * review snapd PR#2624
  * jjohansen
   * dconf/gsettings mediation
    * write additional regression tests
    * do FFE paperwork
   * preparing next batch of !AppArmor kernel patches to upstream
   * chase down kernel regressions that caused !AppArmor patches to be reverted from the recent SRU kernel
Line 40: Line 55:
   * vacation/email catch-up
   * MIR
   * shadow update
   * finish mellon/lasso MIR
   * pick up another MIR
Line 43: Line 59:
   * update Thunderbird
   * update Firefox PPAs
   * embargoed fix
   * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation
   * Firefox update for a regression fix
   * Thunderbird update
   * Oxide release
   * embargoed update
   * get firefox building with rustc/cargo
   * oxide development/reviews
Line 49: Line 67:
   * UCT extension
  * mdeslaur
   * weekly role: cve triage
  * tyhicks
   * sprinting
  * jjohansen
   * !AppArmor work


   * CVE notifications
    * improvements to other CVE tools
   * internal tasks
   * security updates for ubuntu-core 15.04 and Touch
Line 63: Line 75:
  * None   * none
Line 66: Line 78:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-09-16.30.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-03-13-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Mar 20th 2017 16:31 UTC

  • End: 16:48 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • chrisccoulson
  • ratliff

Not present

  • none

Agenda

  • Announcements
    • None
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • review tools updates for recent issues
      • snappy PR reviews
      • store reviews
      • various policy updates
        • mir on dragonboard
      • seccomp arg filtering in snappy confinement policy
    • mdeslaur
      • weekly role: cve triage
      • security updates
    • sbeattie
      • weekly role: happy place
      • glibc updates
      • look into QRT regressions/failures for the kernel team
      • security updates
    • tyhicks
      • weekly role: happy place
      • embargoed issue
      • propose design change for seccomp kernel patches and get out v5
      • design review
      • review snapd PR#2624
    • jjohansen
      • dconf/gsettings mediation
        • write additional regression tests
        • do FFE paperwork
      • preparing next batch of AppArmor kernel patches to upstream

      • chase down kernel regressions that caused AppArmor patches to be reverted from the recent SRU kernel

    • sarnold
      • weekly role: community
      • shadow update
      • finish mellon/lasso MIR
      • pick up another MIR
    • ChrisCoulson

      • Firefox update for a regression fix
      • Thunderbird update
      • Oxide release
      • embargoed update
      • get firefox building with rustc/cargo
      • oxide development/reviews
    • ratliff
      • weekly role: bug triage
      • CVE notifications
        • improvements to other CVE tools
      • internal tasks
      • security updates for ubuntu-core 15.04 and Touch
  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • none

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-03-13-16.31.moin.txt

MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)