20170424
3307
Comment:
|
3035
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170109 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20170306 ## page was copied from MeetingLogs/Security/20170227 == Meeting == |
Line 4: | Line 5: |
* '''When''': Mon Jan 23rd 2017 16:30 UTC * '''End''': 16:49 UTC |
* '''When''': Mon Mar 06th 2017 16:31 UTC * '''End''': 16:51 UTC |
Line 14: | Line 15: |
* jjohansen | |
Line 20: | Line 20: |
* None | * jjohansen |
Line 24: | Line 24: |
* Ahmed Farag provided notifications for false positive virus identification for files in the archive (pnsnap, ettercap-common, dbacl, and libmail-deliverystatus-bounceparser-perl). * Scott Kitterman (ScottK) provided a debdiff for trusty for pdns-recursor (LP: #Bug:1656931) * Clive Johnston (clivejo) provided a debdiff for xenial for ark (LP: #Bug:1655507) * Vishnu Vardhan Reddy Naini (visred) provided a debdiff for yakkety for ark (LP: #Bug:1655507) |
* Jeremy Bicha (jbicha) provided debdiffs for xenial-yakkety for iio-sensor-proxy (LP: #Bug:1666358) * Vishnu Naini (visred) provided debdiffs for xenial-yakkety for kde4libs and kio (LP: #Bug:1668871) |
Line 30: | Line 28: |
* make sure ufw 0.35-3 gets into Debian and zesty (to fix a ftbfs due to an updated netbase which broke the testsuite). trunk is fixed and packages prepared/tested, just need to make sure they get everywhere * plan to continue to help Tyler and Emily with sprint preparation, feedback and outcomes as necessary * have several PR reviews and followups for snapd 2.21 * organize snapd/policykit documents for future discussions * have a number of policy updates I'd like to have in place this week in time for snapd 2.21 * work on seccomp arg filtering policy in earnest |
* review tools updates for recent issues * snappy PR reviews * store reviews * various policy updates * mir on dragonboard * seccomp arg filtering in snappy confinement policy |
Line 37: | Line 35: |
* weekly role: happy place * embargoed issue * imagemagick updates to test/release * security updates * large apache2 backport * sbeattie |
|
Line 38: | Line 42: |
* sbeattie | * embargoed issue * glibc updates * security updates * tyhicks |
Line 40: | Line 47: |
* finish the ssh updates I was working on * look in more depth at the aslr/relocatable symbols stuff that came up * have a few kernel signoffs to do due to respins * try to pick up another update as well * tyhicks * weekly role: cve triage * finish and submit second revision of seccomp/libseccomp patches to upstream * upload !AppArmor 2.11.0 to zesty * embargoed issue |
* propose design change for seccomp kernel patches and get out v5 * design review {{{#!wiki comment |
Line 50: | Line 51: |
* !AppArmor work | * dconf/gsettings mediation * revise and submit userspace patches to address review feedback * submit the !AppArmor policy notifaction interface patches for review * preparing next batch of !AppArmor kernel patches to upstream }}} |
Line 52: | Line 57: |
* weekly role: happy place * vacation/email catch-up * MIR |
* weekly role: CVE triage * shadow update * finish lasso MIR * !AppArmor patch review * pick up another MIR |
Line 56: | Line 63: |
* update Thunderbird * update Firefox PPAs * embargoed fix * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation |
* firefox update * prepare for thunderbird update * finish large oxide code review * get cargo bootstrapped in all releases * oxide development * sponsor chromium-browser |
Line 62: | Line 71: |
* UCT extension | * CVE notifications * internal tasks * security updates for ubuntu-core 15.04 and Touch |
Line 67: | Line 78: |
* None | * none |
Line 70: | Line 81: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-09-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-02-27-16.42.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 06th 2017 16:31 UTC
End: 16:51 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
- chrisccoulson
- ratliff
Not present
- jjohansen
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- review tools updates for recent issues
- snappy PR reviews
- store reviews
- various policy updates
- mir on dragonboard
- seccomp arg filtering in snappy confinement policy
- mdeslaur
- weekly role: happy place
- embargoed issue
- imagemagick updates to test/release
- security updates
- large apache2 backport
- sbeattie
- weekly role: community
- embargoed issue
- glibc updates
- security updates
- tyhicks
- weekly role: bug triage
- propose design change for seccomp kernel patches and get out v5
- design review
- sarnold
- weekly role: CVE triage
- shadow update
- finish lasso MIR
AppArmor patch review
- pick up another MIR
ChrisCoulson
- firefox update
- prepare for thunderbird update
- finish large oxide code review
- get cargo bootstrapped in all releases
- oxide development
- sponsor chromium-browser
- ratliff
- weekly role: happy place
- CVE notifications
- internal tasks
- security updates for ubuntu-core 15.04 and Touch
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- none
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-02-27-16.42.moin.txt
MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)