20170424
3307
Comment:
|
2866
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170109 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20170313 ## page was copied from MeetingLogs/Security/20170306 == Meeting == |
Line 4: | Line 5: |
* '''When''': Mon Jan 23rd 2017 16:30 UTC * '''End''': 16:49 UTC |
* '''When''': Mon Mar 13th 2017 16:31 UTC * '''End''': 16:48 UTC |
Line 10: | Line 11: |
* jdstrand | |
Line 20: | Line 20: |
* None | * jdstrand |
Line 24: | Line 24: |
* Ahmed Farag provided notifications for false positive virus identification for files in the archive (pnsnap, ettercap-common, dbacl, and libmail-deliverystatus-bounceparser-perl). * Scott Kitterman (ScottK) provided a debdiff for trusty for pdns-recursor (LP: #Bug:1656931) * Clive Johnston (clivejo) provided a debdiff for xenial for ark (LP: #Bug:1655507) * Vishnu Vardhan Reddy Naini (visred) provided a debdiff for yakkety for ark (LP: #Bug:1655507) |
* None |
Line 29: | Line 26: |
{{{#!wiki comment | |
Line 30: | Line 28: |
* make sure ufw 0.35-3 gets into Debian and zesty (to fix a ftbfs due to an updated netbase which broke the testsuite). trunk is fixed and packages prepared/tested, just need to make sure they get everywhere * plan to continue to help Tyler and Emily with sprint preparation, feedback and outcomes as necessary * have several PR reviews and followups for snapd 2.21 * organize snapd/policykit documents for future discussions * have a number of policy updates I'd like to have in place this week in time for snapd 2.21 * work on seccomp arg filtering policy in earnest |
* review tools updates for recent issues * snappy PR reviews * store reviews * various policy updates * mir on dragonboard * seccomp arg filtering in snappy confinement policy }}} |
Line 37: | Line 36: |
* weekly role: happy place * security updates * sbeattie * weekly role: happy place * glibc updates * look into QRT regressions/failures for the kernel team * security updates * tyhicks |
|
Line 38: | Line 45: |
* sbeattie | * embargoed issue * propose design change for seccomp kernel patches and get out v5 * design review * review snapd PR#2624 * jjohansen * dconf/gsettings mediation * write additional regression tests * do FFE paperwork * preparing next batch of !AppArmor kernel patches to upstream * chase down kernel regressions that caused !AppArmor patches to be reverted from the recent SRU kernel * sarnold |
Line 40: | Line 57: |
* finish the ssh updates I was working on * look in more depth at the aslr/relocatable symbols stuff that came up * have a few kernel signoffs to do due to respins * try to pick up another update as well * tyhicks * weekly role: cve triage * finish and submit second revision of seccomp/libseccomp patches to upstream * upload !AppArmor 2.11.0 to zesty * embargoed issue * jjohansen * !AppArmor work * sarnold * weekly role: happy place * vacation/email catch-up * MIR |
* shadow update * finish mellon/lasso MIR * pick up another MIR |
Line 56: | Line 61: |
* update Thunderbird * update Firefox PPAs * embargoed fix * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation |
* Firefox update for a regression fix * Thunderbird update * Oxide release * embargoed update * get firefox building with rustc/cargo * oxide development/reviews |
Line 61: | Line 68: |
* weekly role: happy place * UCT extension |
* weekly role: CVE triage * CVE notifications * improvements to other CVE tools * internal tasks * security updates for ubuntu-core 15.04 and Touch |
Line 67: | Line 77: |
* None | * none |
Line 70: | Line 80: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-09-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-03-13-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 13th 2017 16:31 UTC
End: 16:48 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
Not present
- jdstrand
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- mdeslaur
- weekly role: happy place
- security updates
- sbeattie
- weekly role: happy place
- glibc updates
- look into QRT regressions/failures for the kernel team
- security updates
- tyhicks
- weekly role: community
- embargoed issue
- propose design change for seccomp kernel patches and get out v5
- design review
- review snapd PR#2624
- jjohansen
- dconf/gsettings mediation
- write additional regression tests
- do FFE paperwork
preparing next batch of AppArmor kernel patches to upstream
chase down kernel regressions that caused AppArmor patches to be reverted from the recent SRU kernel
- dconf/gsettings mediation
- sarnold
- weekly role: bug triage
- shadow update
- finish mellon/lasso MIR
- pick up another MIR
ChrisCoulson
- Firefox update for a regression fix
- Thunderbird update
- Oxide release
- embargoed update
- get firefox building with rustc/cargo
- oxide development/reviews
- ratliff
- weekly role: CVE triage
- CVE notifications
- improvements to other CVE tools
- internal tasks
- security updates for ubuntu-core 15.04 and Touch
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- none
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-03-13-16.31.moin.txt
MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)