20171204
3246
Comment:
|
3336
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from MeetingLogs/Security/20170605 | ## page was copied from MeetingLogs/Security/20170814 |
Line 4: | Line 4: |
* '''When''': Mon June 12th 2017 16:31 UTC * '''End''': 16:48 UTC |
* '''When''': Mon Aug 28th 2017 16:30 UTC * '''End''': 16:50 UTC |
Line 10: | Line 10: |
* jdstrand * mdeslaur |
|
Line 21: | Line 19: |
* None | * jdstrand * mdeslaur |
Line 25: | Line 24: |
* Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249) * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091) * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722) |
* Simon Quigley (tsimonq2) provided a debdiff for trusty for kdepimlibs (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided a debdiff for xenial for kcoreaddons (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for varnish (LP: #Bug:1708354) |
Line 29: | Line 28: |
{{{#!wiki comment | |
Line 30: | Line 30: |
* finish overlayfs/apparmor/snaps investigation * snappy-debug work * fix to work with journald * update for snapd 2.25/2.26 * gnome3/wayland/plasma interfaces * snappy forum discussions and PR reviews * miscellaneous snappy policy updates PR * embargoed issue |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
Line 39: | Line 43: |
* weekly role: community * puppet updates * libtasn updates * additional security updates as time allows |
* weekly role: bug triage * postgresql updates * test long standing security updates in the security PPA * security updates }}} |
Line 44: | Line 49: |
* weekly role: bug Triage * embargoed issue * sudo update * kernel triage bits |
* weekly role: cve triage * security updates * openjdk-7 to sponsor * pick up others * !AppArmor reviews * minor QRT backlog of issues |
Line 49: | Line 56: |
* weekly role: CVE triage * !eCryptfs patch review (userspace and kernel) * seccomp patches * finish elfutils updates * pick up security update |
* weekly role: happy place * finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging |
Line 55: | Line 60: |
* LSS talk/discussion proposal * LSS program committee duties |
|
Line 58: | Line 61: |
* merge against security tree * some remaining work before the pull request can be sent * work with SUSE regarding the AppArmor patches for 4.13 kernel |
* minor cleanups before submitting 4.14 pull request * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey |
Line 63: | Line 66: |
* sponsor two updates from last week * xdelta3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* !AppArmor kernel patch review as needed * pcp MIR |
Line 67: | Line 69: |
* Firefox updates * sponsor chromium-browser updates * embargoed issue * work on the Firefox start page * move away start.ubuntu.com * provide Ubuntu-specific design once we hear back |
* firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 |
Line 75: | Line 74: |
* internal tasks * technical communication * Ubuntu Core 15 updates |
* preparing more KPIs * documenting our KPIs * leosilva * weekly role: community * libgd2 updates * pick up security updates |
Line 82: | Line 84: |
* none | * None |
Line 85: | Line 87: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-05-16.31.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-14-16.30.moin.txt |
Meeting (DRAFT)
Who: SecurityTeam
When: Mon Aug 28th 2017 16:30 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jdstrand
- mdeslaur
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- sbeattie
- weekly role: cve triage
- security updates
- openjdk-7 to sponsor
- pick up others
AppArmor reviews
- minor QRT backlog of issues
- tyhicks
- weekly role: happy place
- finish making changes to seccomp v6 kernel patch set, test, and submit upstream
- fscrypt pam module review and packaging
- jjohansen
AppArmor kernel patch upstreaming
- minor cleanups before submitting 4.14 pull request
- type splitting to fix stored path issue in UNIX mediation
- testing of LSM stacking and get feedback to Casey
- sarnold
- weekly role: happy place
AppArmor kernel patch review as needed
- pcp MIR
ChrisCoulson
- firefox update (55.0.1)
- firefox update (55.0.2)
- update rustc to 1.19
- ratliff
- weekly role: happy place
- preparing more KPIs
- documenting our KPIs
- leosilva
- weekly role: community
- libgd2 updates
- pick up security updates
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-14-16.30.moin.txt
MeetingLogs/Security/20171204 (last edited 2017-12-04 16:57:57 by tyhicks)