20171016
3506
Comment:
|
← Revision 39 as of 2017-10-16 16:51:33 ⇥
2794
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170828 == Meeting (Draft) == |
## page was copied from MeetingLogs/Security/20171002 == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon Sep 11th 2017 16:30 UTC * '''End''': 16:55 UTC |
* '''When''': Mon Oct 16th 2017 16:31 UTC * '''End''': 16:50 UTC |
Line 10: | Line 10: |
* jdstrand | |
Line 14: | Line 13: |
* jjohansen | |
Line 20: | Line 20: |
* jjohansen | * jdstrand |
Line 24: | Line 24: |
* Gianfranco Costamagna provided a debdiff for xenial for check-all-the-things (LP: #Bug:1597245) * Simon Quigley (tsimonq2) provided a debdiff for xenial for karchive (LP: #Bug:1712948) * James Cowgill (jcowgill) provided debdiffs for xenial and zesty for mbedtls (LP: #Bug:1714640) |
* Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for git (LP: #Bug:1719740) |
Line 28: | Line 26: |
{{{#!wiki comment | |
Line 29: | Line 28: |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
* snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * per user mounts PR * continue uid/gid work for snap privilege dropping * prepare for sprint }}} |
Line 43: | Line 36: |
* postgresql updates * test long standing security updates in the security PPA * security updates |
* wpa updates * xorg updates * additional security updates |
Line 48: | Line 41: |
* kernel USNs to publish * kernel CVE triage * embargoed issue to investigate * security updates * QRT and !AppArmor bugs to investigate |
* Perl update * testing/publishing another security update * !AppArmor maintenance tasks * additional security updates |
Line 54: | Line 46: |
* weekly role: happy place * finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging {{{#!wiki comment |
* weekly role: community * SRU verifications for libseccomp and seccomp kernel changes * finalize upstream work for libseccomp and libseccomp-golang * email catchup from traveling |
Line 59: | Line 51: |
* !AppArmor Artful kernel bug for apparmorfs perms (LP: #Bug:1713103) * !AppArmor parser failures reported by cboltz * !AppArmor regression test updates * Plumbers/LSS prep * !AppArmor kernel patch upstreaming * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey }}} |
* 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog |
Line 69: | Line 57: |
* spice-html5 MIR | * !AppArmor kernel patch reviews * spice-vdagent MIR |
Line 71: | Line 60: |
* firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 |
* update to rust 1.20 in all releases * talk with Will Cooke about the firefox startpage * !AppArmor kernel auditing changes |
Line 75: | Line 64: |
* weekly role: community * migrating KPI jobs to lillypilly * internal items * UC15 updates |
* weekly role: cve triage * sprint followup |
Line 80: | Line 67: |
* weekly role: cve triage * security update publishing * pick up security updates |
* weekly role: happy place * research snap packaging * testing/publishing sssd * additional security updates |
Line 90: | Line 78: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2017/ubuntu-meeting-2.2017-08-28-16.38.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-16-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Oct 16th 2017 16:31 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jdstrand
Agenda
- Announcements
Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for git (LP: #1719740)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- mdeslaur
- weekly role: happy place
- wpa updates
- xorg updates
- additional security updates
- sbeattie
- weekly role: happy place
- Perl update
- testing/publishing another security update
AppArmor maintenance tasks
- additional security updates
- tyhicks
- weekly role: community
- SRU verifications for libseccomp and seccomp kernel changes
- finalize upstream work for libseccomp and libseccomp-golang
- email catchup from traveling
- jjohansen
4.15 AppArmor pull request
- type splitting
- unix domain sockets RFC
AppArmor bug backlog
- sarnold
- weekly role: bug triage
AppArmor kernel patch reviews
- spice-vdagent MIR
ChrisCoulson
- update to rust 1.20 in all releases
- talk with Will Cooke about the firefox startpage
AppArmor kernel auditing changes
- ratliff
- weekly role: cve triage
- sprint followup
- leosilva
- weekly role: happy place
- research snap packaging
- testing/publishing sssd
- additional security updates
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-16-16.31.moin.txt
MeetingLogs/Security/20171016 (last edited 2017-10-16 16:51:33 by tyhicks)