20170424
Size: 3038
Comment:
|
← Revision 43 as of 2017-04-24 16:52:08 ⇥
Size: 3063
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170227 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20170417 == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon Mar 06th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Apr 24th 2017 16:31 UTC * '''End''': 16:50 UTC |
Line 20: | Line 20: |
* None | * none |
Line 24: | Line 24: |
* Jeremy Bicha (jbicha) provided debdiffs for xenial-yakkety for iio-sensor-proxy (LP: #Bug:1666358) * Vishnu Naini (visred) provided debdiffs for xenial-yakkety for kde4libs and kio (LP: #Bug:1668871) |
* None |
Line 28: | Line 27: |
* snappy PR reviews * snap-confine * Personal * interfaces * store reviews * various policy updates for snapd 2.23 * gsetting mediation patch review * better leverage seccomp arg filtering in snappy confinement policy |
* gnome3/wayland/plasma interfaces * snappy PRs and store reviews * seccomp arg filtering is unblocked so pick that work back up * fix the mknod PR * pick up the uid/gid branch * miscellaneous policy updates for bug fixes * pam apparmor/stacking documentation updates |
Line 37: | Line 35: |
* weekly role: cve triage * samba updates * qemu updates * mysql updates * nss updates * ca-certificates updates * sbeattie |
|
Line 38: | Line 43: |
* tiff updates * security updates * sbeattie |
* libxslt updates * kernel USNs * openjdk packages to test and publish * !AppArmor patch review * QRT fixes * tyhicks * weekly role: happy place * finish seccomp v5 patch set * embargoed issue * sponsor mozjs38 security update * sprint prep * jjohansen * !AppArmor kernel patch upstreaming * focus on securityfs filesystem interface * checkpatch cleanups required for upstreaming the next round * !AppArmor bugs * apparmorfs bugs 1669611 and 1660846 * rlimit issue in zesty (LP: #1679704) * kernel command line bug 1678048 * sarnold |
Line 42: | Line 64: |
* kernel signoffs * security updates * tyhicks * weekly role: bug triage * propose design change for seccomp kernel patches and get out v5 * submit v2 of apparmor utils patch set * design review * new laptop setup * jjohansen * dconf/gsettings mediation * revise and submit userspace patches to address review feedback * submit the !AppArmor policy notifaction interface patches for review * preparing next batch of !AppArmor kernel patches to upstream * sarnold * weekly role: CVE triage |
|
Line 59: | Line 66: |
* !AppArmor patch review * pick up another MIR |
* devel opens release cycle duties |
Line 62: | Line 68: |
* take doko's rustc and supporting packages for 16.04/14.04 and get firefox building with them * start preparing next firefox update * need to fix crasher caused by menubar patch * fix ubufox breakage * two large oxide code reviews * sponsor chromium-browser |
* thunderbird updates * chromium-browser updates * re-automate the uploading of firefox debug symbols * firefox build failures * determine what to do with ubufox and start page once Firefox drops legacy extension support * reach out to Mozilla to discuss |
Line 69: | Line 75: |
* weekly role: happy place * security updates for ubuntu-core 15.04 and Touch |
* weekly role: bug triage * sprint prep * analysis of our work |
Line 75: | Line 82: |
* none | * sarnold volunteered to do the new devel duties for the team |
Line 78: | Line 85: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-02-27-16.42.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-04-24-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 24th 2017 16:31 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
Not present
- none
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- gnome3/wayland/plasma interfaces
- snappy PRs and store reviews
- seccomp arg filtering is unblocked so pick that work back up
- fix the mknod PR
- pick up the uid/gid branch
- miscellaneous policy updates for bug fixes
- pam apparmor/stacking documentation updates
- mdeslaur
- weekly role: cve triage
- samba updates
- qemu updates
- mysql updates
- nss updates
- ca-certificates updates
- sbeattie
- weekly role: happy place
- libxslt updates
- kernel USNs
- openjdk packages to test and publish
AppArmor patch review
- QRT fixes
- tyhicks
- weekly role: happy place
- finish seccomp v5 patch set
- embargoed issue
- sponsor mozjs38 security update
- sprint prep
- jjohansen
AppArmor kernel patch upstreaming
- focus on securityfs filesystem interface
- checkpatch cleanups required for upstreaming the next round
AppArmor bugs
- apparmorfs bugs 1669611 and 1660846
- rlimit issue in zesty (LP: #1679704)
- kernel command line bug 1678048
- sarnold
- weekly role: community
- shadow update
- finish lasso MIR
- devel opens release cycle duties
ChrisCoulson
- thunderbird updates
- chromium-browser updates
- re-automate the uploading of firefox debug symbols
- firefox build failures
- determine what to do with ubufox and start page once Firefox drops legacy extension support
- reach out to Mozilla to discuss
- ratliff
- weekly role: bug triage
- sprint prep
- analysis of our work
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- sarnold volunteered to do the new devel duties for the team
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-04-24-16.31.moin.txt
MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)