20171106
Size: 3270
Comment:
|
← Revision 48 as of 2017-11-06 17:01:47 ⇥
Size: 3077
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170814 ## page was copied from MeetingLogs/Security/20170807 |
## page was copied from MeetingLogs/Security/20171030 |
Line 5: | Line 4: |
* '''When''': Mon Aug 14th 2017 16:30 UTC * '''End''': 16:50 UTC |
* '''When''': Mon Nov 6th 2017 16:37 UTC * '''End''': 17:00 UTC |
Line 15: | Line 14: |
* jjohansen | |
Line 22: | Line 20: |
* None | * jjohansen |
Line 26: | Line 24: |
* Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for vlc (LP: #Bug:1709420) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for menu-cache (LP: #Bug:1703564) |
* Lucas Kocia (lkocia) provided a debdiff for xenial for firewalld (LP: #Bug:1617617) * Jeremy Bicha (jbicha) provided a debdiff for zesty for gdm3 (LP: #Bug:1729354) |
Line 30: | Line 28: |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
* finish new spread tests for better high-level coverage of security backends * snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * investigate udev_enumerate regression * broadcom-asic-control interface bug * continue uid/gid work for snap privilege dropping |
Line 44: | Line 36: |
* postgresql updates * test long standing security updates in the security PPA * security updates |
* openssl updates * imagemagick updates * additional security updates |
Line 49: | Line 41: |
* security updates * openjdk-7 to sponsor * pick up others * !AppArmor reviews * minor QRT backlog of issues |
* openjdk-8 updates to test and publish * kernel CVE triage * CVE notifications for snap owners * wrap up the !AppArmor migration to gitlab |
Line 56: | Line 47: |
* finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging |
* eCryptfs patch review * squashfs reproduceability * get final clarification on AppArmor audit even ID numbers * embargoed issues {{{#!wiki comment |
Line 59: | Line 53: |
* !AppArmor kernel patch upstreaming * minor cleanups before submitting 4.14 pull request * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey |
* 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog }}} |
Line 65: | Line 60: |
* !AppArmor kernel patch review as needed * pcp MIR |
* !AppArmor patch review * embargoed issue |
Line 68: | Line 63: |
* firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 |
* prepare firefox update * large update that could use additional testing * update to rust 1.21 in all releases * two builds that randomly fail * !AppArmor kernel auditing changes |
Line 73: | Line 70: |
* preparing more KPIs * documenting our KPIs |
* writing assignments * integrating InfluxDB into security KPIs |
Line 77: | Line 74: |
* libgd2 updates * pick up security updates |
* liblouis updates * vim updates * security updates |
Line 86: | Line 84: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-14-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-11-06-16.37.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Nov 6th 2017 16:37 UTC
End: 17:00 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jjohansen
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish new spread tests for better high-level coverage of security backends
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- investigate udev_enumerate regression
- broadcom-asic-control interface bug
- continue uid/gid work for snap privilege dropping
- mdeslaur
- weekly role: bug triage
- openssl updates
- imagemagick updates
- additional security updates
- sbeattie
- weekly role: cve triage
- openjdk-8 updates to test and publish
- kernel CVE triage
- CVE notifications for snap owners
wrap up the AppArmor migration to gitlab
- tyhicks
- weekly role: happy place
- eCryptfs patch review
- squashfs reproduceability
get final clarification on AppArmor audit even ID numbers
- embargoed issues
- sarnold
- weekly role: happy place
AppArmor patch review
- embargoed issue
ChrisCoulson
- prepare firefox update
- large update that could use additional testing
- update to rust 1.21 in all releases
- two builds that randomly fail
AppArmor kernel auditing changes
- prepare firefox update
- ratliff
- weekly role: happy place
- writing assignments
- integrating InfluxDB into security KPIs
- leosilva
- weekly role: community
- liblouis updates
- vim updates
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-11-06-16.37.moin.txt
MeetingLogs/Security/20171106 (last edited 2017-11-06 17:01:47 by tyhicks)