20171016
3215
Comment:
|
2995
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170807 | ## page was copied from MeetingLogs/Security/20170918 |
Line 4: | Line 4: |
* '''When''': Mon Aug 14th 2017 16:30 UTC * '''End''': 16:50 UTC |
* '''When''': Mon Oct 2nd 2017 16:30 UTC * '''End''': 16:48 UTC |
Line 15: | Line 15: |
* sarnold | |
Line 21: | Line 20: |
* None | * sarnold |
Line 25: | Line 24: |
* Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for vlc (LP: #Bug:1709420) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for menu-cache (LP: #Bug:1703564) |
* Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for jython (LP: #Bug:1714728) |
Line 29: | Line 27: |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
* snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * per user mounts PR * continue uid/gid work for snap privilege dropping * prepare for sprint |
Line 42: | Line 33: |
* weekly role: community * dnsmasq updates * ca-certificates updates * nss updates * additional security updates * sbeattie |
|
Line 43: | Line 40: |
* postgresql updates * test long standing security updates in the security PPA * security updates * sbeattie |
* rally followups * finish branch conversions from bzr to gi * security team processes * perl update * kernel triage * additional security updates * tyhicks |
Line 48: | Line 48: |
* security updates * openjdk-7 to sponsor * pick up others * !AppArmor reviews * minor QRT backlog of issues * tyhicks * weekly role: happy place * finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging |
* finish packaging/testing fscrypt 0.2.1 * sprint prep * CVE reporting script * CVE triage workflow improvements * fianlize snapd PR for new seccomp logging features |
Line 58: | Line 54: |
* !AppArmor kernel patch upstreaming * minor cleanups before submitting 4.14 pull request * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey |
* 4.15 !AppArmor pull request * type splitting * unix domain sockets * !AppArmor patch review from mjg59 * revise LSM stacking patches {{{#!wiki comment |
Line 63: | Line 61: |
* weekly role: happy place * !AppArmor kernel patch review as needed * pcp MIR |
* weekly role: community * !AppArmor kernel patch reviews * python pyelftools MIR * rally prep }}} |
Line 67: | Line 67: |
* firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 |
* firefox updates * thunderbird updates * chromium-browser updates * !AppArmor kernel auditing changes * firefox start page mockup |
Line 72: | Line 74: |
* preparing more KPIs * documenting our KPIs |
* default install audits * internal task * sprint prep |
Line 75: | Line 78: |
* weekly role: community * libgd2 updates * pick up security updates |
* weekly role: happy place * libpoppler updates * dnsmasq ESM update * additional security updates |
Line 85: | Line 89: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-14-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-02-16.30.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Oct 2nd 2017 16:30 UTC
End: 16:48 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- chrisccoulson
- ratliff
- leosilva
Not present
- sarnold
Agenda
- Announcements
Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for jython (LP: #1714728)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- per user mounts PR
- continue uid/gid work for snap privilege dropping
- prepare for sprint
- snapd PR reviews
- mdeslaur
- weekly role: community
- dnsmasq updates
- ca-certificates updates
- nss updates
- additional security updates
- sbeattie
- weekly role: bug triage
- rally followups
- finish branch conversions from bzr to gi
- security team processes
- perl update
- kernel triage
- additional security updates
- tyhicks
- weekly role: cve triage
- finish packaging/testing fscrypt 0.2.1
- sprint prep
- CVE reporting script
- CVE triage workflow improvements
- fianlize snapd PR for new seccomp logging features
- jjohansen
4.15 AppArmor pull request
- type splitting
- unix domain sockets
AppArmor patch review from mjg59
- revise LSM stacking patches
ChrisCoulson
- firefox updates
- thunderbird updates
- chromium-browser updates
AppArmor kernel auditing changes
- firefox start page mockup
- ratliff
- weekly role: happy place
- default install audits
- internal task
- sprint prep
- leosilva
- weekly role: happy place
- libpoppler updates
- dnsmasq ESM update
- additional security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-02-16.30.moin.txt
MeetingLogs/Security/20171016 (last edited 2017-10-16 16:51:33 by tyhicks)