20171106
Size: 2754
Comment:
|
Size: 2915
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
== Meeting (DRAFT) == | == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon Oct 30th 2017 16:30 UTC | * '''When''': Mon Oct 30th 2017 16:33 UTC |
Line 14: | Line 14: |
* jjohansen * sarnold |
|
Line 21: | Line 19: |
* None | * jjohansen * sarnold |
Line 31: | Line 30: |
* misc snapd interface policy updates | * track udev tagging and device cgroup regression * verify uhid interface is still working * broadcom-asic-control interface bug * misc snapd interface policy updates for 2.29 |
Line 35: | Line 37: |
* curl updates * mysql updates * webkitgtk+ updates |
* quagga updates |
Line 41: | Line 41: |
* start work on CVE notifications for snap owners * !AppArmor work to support Debian's !AppArmor-in-Debian sprint * security update * kernel CVE triage |
* followups from !AppArmor-in-Debian sprint * kernel signoffs and USN publications * openjdk-8 updates to test and publish * CVE notifications for snap owners |
Line 50: | Line 50: |
{{{#!wiki comment | |
Line 55: | Line 56: |
}}} | |
Line 57: | Line 59: |
* !AppArmor work to support Debian's !AppArmor-in-Debian sprint | |
Line 60: | Line 61: |
* !AppArmor patch review * embargoed issue |
|
Line 62: | Line 65: |
* update to rust 1.20 in all releases * artful is done |
* look into unscheduled firefox release from last week * update to rust 1.21 in all releases |
Line 67: | Line 70: |
* internal duties | * writing assignments * integrating InfluxDB into security KPIs |
Line 70: | Line 74: |
* 12.04 ESM updates * additional security updates |
* security updates |
Line 79: | Line 82: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-23-16.31.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-30-16.33.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Oct 30th 2017 16:33 UTC
End: 16:45 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- chrisccoulson
- ratliff
- leosilva
Not present
- jjohansen
- sarnold
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish some snappy-debug work based on sprint feedback
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- track udev tagging and device cgroup regression
- verify uhid interface is still working
- broadcom-asic-control interface bug
- misc snapd interface policy updates for 2.29
- continue uid/gid work for snap privilege dropping
- mdeslaur
- weekly role: cve triage
- quagga updates
- additional security updates
- sbeattie
- weekly role: happy place
followups from AppArmor-in-Debian sprint
- kernel signoffs and USN publications
- openjdk-8 updates to test and publish
- CVE notifications for snap owners
- tyhicks
- weekly role: happy place
- eCryptfs patch review
- squashfs reproduceability
- embargoed issues
- sarnold
- weekly role: happy place
- spice-vdagent MIR
- pcp MIR
AppArmor patch review
- embargoed issue
ChrisCoulson
- chromium-browser update to test and publish
- look into unscheduled firefox release from last week
- update to rust 1.21 in all releases
AppArmor kernel auditing changes
- ratliff
- weekly role: community
- writing assignments
- integrating InfluxDB into security KPIs
- leosilva
- weekly role: bug triage
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-30-16.33.moin.txt
MeetingLogs/Security/20171106 (last edited 2017-11-06 17:01:47 by tyhicks)