20171113
Size: 3210
Comment:
|
← Revision 51 as of 2017-11-13 16:58:10 ⇥
Size: 2888
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170626 ## page was copied from MeetingLogs/Security/20170619 |
## page was copied from MeetingLogs/Security/20171106 |
Line 5: | Line 4: |
* '''When''': Mon June 26th 2017 16:32 UTC * '''End''': 16:46 UTC |
* '''When''': Mon Nov 13th 2017 16:36 UTC * '''End''': 16:57 UTC |
Line 15: | Line 14: |
* chrisccoulson | * jjohansen * sarnold |
Line 20: | Line 20: |
* jjohansen * sarnold |
* chrisccoulson |
Line 25: | Line 24: |
* None | * none |
Line 28: | Line 27: |
* password-manager-service interface PR * finish testing and respond to feedback * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR * wayland interface, as time allows |
* snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * additional reviews * pickup the ssh/gpg interfaces PR * investigate/implement proper fix for hotplugged devices not being added to device cgroup (mir input forum issue) * continue uid/gid work for snap privilege dropping |
Line 37: | Line 34: |
* weekly role: community * security fake syncs * postgresql updates * additional security updates * sbeattie * weekly role: bug triage * CVE notifications for snap owners * !AppArmor upstream work * kernel CVE triage * openjdk-7 updates to test and publish * tyhicks * weekly role: cve triage * squashfs reproduceability * get final clarification on AppArmor audit even ID numbers * embargoed issues * 4.15 !eCryptfs pull request * jjohansen * 4.15 !AppArmor pull request (bug fixes) * !AppArmor bug backlog * LSM stacking work/replies * investigate Debian ptrace denials with brave snap * mount rework * sarnold |
|
Line 38: | Line 58: |
* apache2 updates * additional security updates as time allows * sbeattie |
* embargoed issue {{{#!wiki comment * !ChrisCoulson * prepare firefox update * large update that could use additional testing * update to rust 1.21 in all releases * two builds that randomly fail * !AppArmor kernel auditing changes }}} * ratliff |
Line 42: | Line 69: |
* kernel USN publication * kernel CVE triage * sudo update * openssh update * !AppArmor patch review * tyhicks * weekly role: community * fscrypt evaluation * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment * jjohansen * kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} {{{#!wiki comment * sarnold * weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} * !ChrisCoulson * embargoed issue * thunderbird update * test new respin builds * chromium update to test and publish * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is * ratliff * weekly role: CVE triage * Ubuntu Core 15 updates |
* internal work |
Line 83: | Line 71: |
* finish shadow testing * shadow sarnold in bug triage duties |
* weekly role: happy place * perl ESM update * security updates |
Line 89: | Line 78: |
* none | * None |
Line 92: | Line 81: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-11-13-16.36.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Nov 13th 2017 16:36 UTC
End: 16:57 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- ratliff
- leosilva
Not present
- chrisccoulson
Agenda
- Announcements
- none
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- additional reviews
- pickup the ssh/gpg interfaces PR
- investigate/implement proper fix for hotplugged devices not being added to device cgroup (mir input forum issue)
- continue uid/gid work for snap privilege dropping
- snapd PR reviews
- mdeslaur
- weekly role: community
- security fake syncs
- postgresql updates
- additional security updates
- sbeattie
- weekly role: bug triage
- CVE notifications for snap owners
AppArmor upstream work
- kernel CVE triage
- openjdk-7 updates to test and publish
- tyhicks
- weekly role: cve triage
- squashfs reproduceability
get final clarification on AppArmor audit even ID numbers
- embargoed issues
- 4.15 !eCryptfs pull request
- jjohansen
4.15 AppArmor pull request (bug fixes)
AppArmor bug backlog
- LSM stacking work/replies
- investigate Debian ptrace denials with brave snap
- mount rework
- sarnold
- weekly role: happy place
- embargoed issue
- ratliff
- weekly role: happy place
- internal work
- leosilva
- weekly role: happy place
- perl ESM update
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-11-13-16.36.moin.txt
MeetingLogs/Security/20171113 (last edited 2017-11-13 16:58:10 by tyhicks)