20170424
2811
Comment:
|
← Revision 43 as of 2017-04-24 16:52:08 ⇥
3063
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170306 | ## page was copied from MeetingLogs/Security/20170417 |
Line 4: | Line 4: |
* '''When''': Mon Mar 13th 2017 16:31 UTC * '''End''': 16:48 UTC |
* '''When''': Mon Apr 24th 2017 16:31 UTC * '''End''': 16:50 UTC |
Line 10: | Line 10: |
* jdstrand | |
Line 19: | Line 20: |
* jdstrand | * none |
Line 25: | Line 26: |
{{{#!wiki comment | |
Line 27: | Line 27: |
* review tools updates for recent issues * snappy PR reviews * store reviews * various policy updates * mir on dragonboard * seccomp arg filtering in snappy confinement policy }}} |
* gnome3/wayland/plasma interfaces * snappy PRs and store reviews * seccomp arg filtering is unblocked so pick that work back up * fix the mknod PR * pick up the uid/gid branch * miscellaneous policy updates for bug fixes * pam apparmor/stacking documentation updates |
Line 35: | Line 35: |
* weekly role: happy place * security updates |
* weekly role: cve triage * samba updates * qemu updates * mysql updates * nss updates * ca-certificates updates |
Line 39: | Line 43: |
* glibc updates * look into QRT regressions/failures for the kernel team * security updates |
* libxslt updates * kernel USNs * openjdk packages to test and publish * !AppArmor patch review * QRT fixes |
Line 43: | Line 49: |
* weekly role: happy place * finish seccomp v5 patch set * embargoed issue * sponsor mozjs38 security update * sprint prep * jjohansen * !AppArmor kernel patch upstreaming * focus on securityfs filesystem interface * checkpatch cleanups required for upstreaming the next round * !AppArmor bugs * apparmorfs bugs 1669611 and 1660846 * rlimit issue in zesty (LP: #1679704) * kernel command line bug 1678048 * sarnold |
|
Line 44: | Line 64: |
* embargoed issue * propose design change for seccomp kernel patches and get out v5 * design review * review snapd PR#2624 * jjohansen * dconf/gsettings mediation * write additional regression tests * do FFE paperwork * preparing next batch of !AppArmor kernel patches to upstream * chase down kernel regressions that caused !AppArmor patches to be reverted from the recent SRU kernel * sarnold |
* shadow update * finish lasso MIR * devel opens release cycle duties * !ChrisCoulson * thunderbird updates * chromium-browser updates * re-automate the uploading of firefox debug symbols * firefox build failures * determine what to do with ubufox and start page once Firefox drops legacy extension support * reach out to Mozilla to discuss * ratliff |
Line 56: | Line 76: |
* shadow update * finish mellon/lasso MIR * pick up another MIR * !ChrisCoulson * Firefox update for a regression fix * Thunderbird update * Oxide release * embargoed update * get firefox building with rustc/cargo * oxide development/reviews * ratliff * weekly role: CVE triage * CVE notifications * improvements to other CVE tools * internal tasks * security updates for ubuntu-core 15.04 and Touch |
* sprint prep * analysis of our work |
Line 76: | Line 82: |
* none | * sarnold volunteered to do the new devel duties for the team |
Line 79: | Line 85: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-03-13-16.31.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-04-24-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 24th 2017 16:31 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
Not present
- none
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- gnome3/wayland/plasma interfaces
- snappy PRs and store reviews
- seccomp arg filtering is unblocked so pick that work back up
- fix the mknod PR
- pick up the uid/gid branch
- miscellaneous policy updates for bug fixes
- pam apparmor/stacking documentation updates
- mdeslaur
- weekly role: cve triage
- samba updates
- qemu updates
- mysql updates
- nss updates
- ca-certificates updates
- sbeattie
- weekly role: happy place
- libxslt updates
- kernel USNs
- openjdk packages to test and publish
AppArmor patch review
- QRT fixes
- tyhicks
- weekly role: happy place
- finish seccomp v5 patch set
- embargoed issue
- sponsor mozjs38 security update
- sprint prep
- jjohansen
AppArmor kernel patch upstreaming
- focus on securityfs filesystem interface
- checkpatch cleanups required for upstreaming the next round
AppArmor bugs
- apparmorfs bugs 1669611 and 1660846
- rlimit issue in zesty (LP: #1679704)
- kernel command line bug 1678048
- sarnold
- weekly role: community
- shadow update
- finish lasso MIR
- devel opens release cycle duties
ChrisCoulson
- thunderbird updates
- chromium-browser updates
- re-automate the uploading of firefox debug symbols
- firefox build failures
- determine what to do with ubufox and start page once Firefox drops legacy extension support
- reach out to Mozilla to discuss
- ratliff
- weekly role: bug triage
- sprint prep
- analysis of our work
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- sarnold volunteered to do the new devel duties for the team
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-04-24-16.31.moin.txt
MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)