20171204
3246
Comment:
|
← Revision 60 as of 2017-12-04 16:57:57 ⇥
2897
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from MeetingLogs/Security/20170605 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20171127 == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon June 12th 2017 16:31 UTC * '''End''': 16:48 UTC |
* '''When''': Mon Dec 4th 2017 16:42 UTC * '''End''': 16:57 UTC |
Line 21: | Line 21: |
* None | * none |
Line 25: | Line 25: |
* Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249) * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091) * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722) |
* none |
Line 30: | Line 28: |
* finish overlayfs/apparmor/snaps investigation * snappy-debug work * fix to work with journald * update for snapd 2.25/2.26 * gnome3/wayland/plasma interfaces * snappy forum discussions and PR reviews * miscellaneous snappy policy updates PR |
* finish review-tools resquashfs tests * investigate/implement proper fix for hotplugged devices not being added to device cgroup (mir input forum issue) * policy updates PR for 2.30 * pickup the ssh/gpg interfaces PR * snapd 2.30 PR reviews * non-2.30 PR reviews as time permits * investigate biometrics observe interface * implement screen-lock interface * mdeslaur * weekly role: happy place * evince security update * ubuntu-support-status improvements * additional security updates * sbeattie * weekly role: happy place * CVE notifications for snap owners * upstream !AppArmor tasks * monitor kernel CVEs and respins * tyhicks * weekly role: happy place * embargoed issues * squashfs reproduceability * nudge a number of things along: * snapd seccomp logging PR * libseccomp Xenial SRU * audit SRUs * libseccomp-golang upstream PR * jjohansen * !AppArmor mount mediation * prepare 4.14 !AppArmor backport for the Ubuntu kernel * update the backport kernels * sarnold * weekly role: bug triage |
Line 38: | Line 62: |
* mdeslaur | * libteam MIR * !ChrisCoulson * rust 1.22 updates * 3 remaining issues to solve * embargoed issue * !AppArmor and audit work * ratliff |
Line 40: | Line 70: |
* puppet updates * libtasn updates * additional security updates as time allows * sbeattie * weekly role: bug Triage |
* internal work |
Line 46: | Line 72: |
* sudo update * kernel triage bits * tyhicks |
* leosilva |
Line 50: | Line 74: |
* !eCryptfs patch review (userspace and kernel) * seccomp patches * finish elfutils updates * pick up security update * jjohansen * LSS talk/discussion proposal * LSS program committee duties * !AppArmor kernel patch upstreaming * merge against security tree * some remaining work before the pull request can be sent * work with SUSE regarding the AppArmor patches for 4.13 kernel * sarnold * weekly role: happy place * sponsor two updates from last week * xdelta3 mir * !AppArmor patch review to support jjohansen's upstreaming work * !ChrisCoulson * Firefox updates * sponsor chromium-browser updates * embargoed issue * work on the Firefox start page * move away start.ubuntu.com * provide Ubuntu-specific design once we hear back * ratliff * weekly role: happy place * internal tasks * technical communication * Ubuntu Core 15 updates |
* curl ESM update * additional security updates |
Line 82: | Line 80: |
* none | * None |
Line 85: | Line 83: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-05-16.31.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-12-04-16.42.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Dec 4th 2017 16:42 UTC
End: 16:57 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- none
Agenda
- Announcements
- none
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish review-tools resquashfs tests
- investigate/implement proper fix for hotplugged devices not being added to device cgroup (mir input forum issue)
- policy updates PR for 2.30
- pickup the ssh/gpg interfaces PR
- snapd 2.30 PR reviews
- non-2.30 PR reviews as time permits
- investigate biometrics observe interface
- implement screen-lock interface
- mdeslaur
- weekly role: happy place
- evince security update
- ubuntu-support-status improvements
- additional security updates
- sbeattie
- weekly role: happy place
- CVE notifications for snap owners
upstream AppArmor tasks
- monitor kernel CVEs and respins
- tyhicks
- weekly role: happy place
- embargoed issues
- squashfs reproduceability
- nudge a number of things along:
- snapd seccomp logging PR
- libseccomp Xenial SRU
- audit SRUs
- libseccomp-golang upstream PR
- jjohansen
AppArmor mount mediation
prepare 4.14 AppArmor backport for the Ubuntu kernel
- update the backport kernels
- sarnold
- weekly role: bug triage
- embargoed issue
- libteam MIR
ChrisCoulson
- rust 1.22 updates
- 3 remaining issues to solve
- embargoed issue
AppArmor and audit work
- rust 1.22 updates
- ratliff
- weekly role: community
- internal work
- embargoed issue
- leosilva
- weekly role: CVE triage
- curl ESM update
- additional security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-12-04-16.42.moin.txt
MeetingLogs/Security/20171204 (last edited 2017-12-04 16:57:57 by tyhicks)