20170424
3742
Comment:
|
2980
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170123 ## page was copied from MeetingLogs/Security/20170109 |
## page was copied from MeetingLogs/Security/20170227 |
Line 5: | Line 4: |
* '''When''': Mon Jan 23rd 2017 16:30 UTC * '''End''': 16:53 UTC |
* '''When''': Mon Mar 06th 2017 16:31 UTC * '''End''': 16:51 UTC |
Line 15: | Line 14: |
* jjohansen | |
Line 21: | Line 19: |
* None | * jjohansen |
Line 25: | Line 23: |
* Ahmed Farag provided notifications for false positive virus identification for files in the archive (pnsnap, ettercap-common, dbacl, and libmail-deliverystatus-bounceparser-perl). * Scott Kitterman (ScottK) provided a debdiff for trusty for pdns-recursor (LP: #Bug:1656931) * Clive Johnston (clivejo) provided a debdiff for xenial for ark (LP: #Bug:1655507) * Vishnu Vardhan Reddy Naini (visred) provided a debdiff for yakkety for ark (LP: #Bug:1655507) |
* Jeremy Bicha (jbicha) provided debdiffs for xenial-yakkety for iio-sensor-proxy (LP: #Bug:1666358) * Vishnu Naini (visred) provided debdiffs for xenial-yakkety for kde4libs and kio (LP: #Bug:1668871) |
Line 31: | Line 27: |
* review tools updates for recent issues | |
Line 32: | Line 29: |
* apparmor policy updates for snappy confinement * prepare a snap for testing confinement policy * better leverage seccomp arg filtering in snappy confinement policy |
* store reviews * various policy updates * mir on dragonboard * seccomp arg filtering in snappy confinement policy |
Line 36: | Line 34: |
* weekly role: happy place * embargoed issue * imagemagick updates to test/release * security updates * large apache2 backport * sbeattie |
|
Line 37: | Line 41: |
* embargoed issue * glibc updates |
|
Line 38: | Line 44: |
* sbeattie | * tyhicks |
Line 40: | Line 46: |
* openjdk-8 updates to test and sponsor * publish new dependencies of linux-raspi2 kernels * pick up a security update * tyhicks * weekly role: cve triage * finish and submit the second revision of seccomp/libseccomp patches to upstream * upload !AppArmor 2.11.0 to zesty * embargoed issue * pick up a security update |
* propose design change for seccomp kernel patches and get out v5 * design review {{{#!wiki comment |
Line 50: | Line 50: |
* !AppArmor bugs * flock not mediated with 'k' (LP: #Bug:1658219) * disconnected path when using filesystem namespaces (LP: #Bug:1656121) * clean up and send xenial/yakkety !AppArmor patches to the kernel team * revise dconf/gsettings mediation patches and sync with desktop team |
* dconf/gsettings mediation * revise and submit userspace patches to address review feedback * submit the !AppArmor policy notifaction interface patches for review |
Line 56: | Line 54: |
* maybe the changes to securityfs | }}} |
Line 58: | Line 56: |
* weekly role: happy place * uvp-monitor MIR |
* weekly role: CVE triage * shadow update * finish lasso MIR * !AppArmor patch review |
Line 61: | Line 61: |
* possibly libapache2-mod-auth-mellon | |
Line 63: | Line 62: |
* firefox updates * fix issues in ubunfox extension caused by breaking changes in firefox 53 * removal of the non-standard 'for each' syntax * backport rust, a new build depend of firefox, to stable releases * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation |
* firefox update * prepare for thunderbird update * finish large oxide code review * get cargo bootstrapped in all releases * oxide development * sponsor chromium-browser |
Line 70: | Line 70: |
* security updates for ubuntu-core 15.04 | * CVE notifications * internal tasks * security updates for ubuntu-core 15.04 and Touch |
Line 75: | Line 77: |
* !ChrisCoulson says that Firefox will begin build depending on rustc sometime in early 2017 which then kicks off about a 12-18 week countdown before it'll be required for a Firefox update in Ubuntu | * none |
Line 78: | Line 80: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-23-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-02-27-16.42.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 06th 2017 16:31 UTC
End: 16:51 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
- chrisccoulson
- ratliff
Not present
- jjohansen
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- review tools updates for recent issues
- snappy PR reviews
- store reviews
- various policy updates
- mir on dragonboard
- seccomp arg filtering in snappy confinement policy
- mdeslaur
- weekly role: happy place
- embargoed issue
- imagemagick updates to test/release
- security updates
- large apache2 backport
- sbeattie
- weekly role: community
- embargoed issue
- glibc updates
- security updates
- tyhicks
- weekly role: bug triage
- propose design change for seccomp kernel patches and get out v5
- design review
- sarnold
- weekly role: CVE triage
- shadow update
- finish lasso MIR
AppArmor patch review
- pick up another MIR
ChrisCoulson
- firefox update
- prepare for thunderbird update
- finish large oxide code review
- get cargo bootstrapped in all releases
- oxide development
- sponsor chromium-browser
- ratliff
- weekly role: happy place
- CVE notifications
- internal tasks
- security updates for ubuntu-core 15.04 and Touch
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- none
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-02-27-16.42.moin.txt
MeetingLogs/Security/20170424 (last edited 2017-04-24 16:52:08 by tyhicks)