20171204

Differences between revisions 29 and 30
Revision 29 as of 2017-09-11 15:49:47
Size: 3506
Editor: tyhicks
Comment:
Revision 30 as of 2017-09-11 16:51:26
Size: 3176
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
== Meeting (Draft) == == Meeting ==
Line 4: Line 4:
 * '''When''': Mon Sep 11th 2017 16:30 UTC
 * '''End''': 16:55 UTC
 * '''When''': Mon Sep 11th 2017 16:31 UTC
 * '''End''': 16:50 UTC
Line 14: Line 14:
 * jjohansen
Line 15: Line 16:
 * chrisccoulson
Line 20: Line 20:
 * jjohansen  * chrisccoulson
Line 29: Line 29:
   * finish going through the wayland interface
   * update !AppArmor to fix evince crash on startup in Artful
   * be responsive to various snappy PRs and feature discussions
    * Solus distro support
    * udev tagging
    * portals
    * layouts
    * race-free profile generation next steps
    * dbus sessions sevices
   * add an exec stack check in the review tools
   * push forward snapd users/groups design
   * add systemd-notify interface as time permits
   * update the review tools
    * new license yaml
    * better error reporting
    * misc fixes
   * snapd layouts feature PR reviews (PR 3621)
   * investigate device cgroup issues in snapd
   * misc snapd policy updates
   * start next steps of uid/gid work in snapd
Line 43: Line 39:
   * postgresql updates
   * test long standing security updates in the security PPA
   * post-vacation catchup
   * qemu updates
Line 48: Line 44:
   * kernel USNs to publish    * embargoed issues
   * libxmls2 update
Line 50: Line 47:
   * embargoed issue to investigate
   * security updates
Line 55: Line 50:
   * finish making changes to seccomp v6 kernel patch set, test, and submit upstream
   * fscrypt pam module review and packaging
  {{{#!wiki comment
   * attend Linux Security Summit
   * package fscrypt 0.2.1
   * test LSM stacking patches
   * attend to libsecomp PR once the review starts
Line 59: Line 55:
   * !AppArmor Artful kernel bug for apparmorfs perms (LP: #Bug:1713103)
   * !AppArmor parser failures reported by cboltz
   * !AppArmor regression test updates
   * Plumbers/LSS prep
   * !AppArmor kernel patch upstreaming
    * type splitting to fix stored path issue in UNIX mediation
   * testing of LSM stacking and get feedback to Casey
  }}}
   * attend Linux Plumbers and Linux Security Summit
    * prep presentations/discussions around !AppArmor, LSM stacking, and LSM namespacing
Line 69: Line 59:
   * spice-html5 MIR    * help with !AppArmor kernel patch reviews
   * nghttp2 MIR
   * python elftools MIR
Line 71: Line 63:
   * firefox update (55.0.1)
   * firefox update (55.0.2)
   * update rustc to 1.19
   * finish updating rustc to 1.19
   * start on updating rustc to 1.20
   * thunderbird update
   * sponsor chromium-browser update
   * fix bugs for Firefox 56
    * menubar
    * FTBFS on Trusty
    * armhf issue
Line 76: Line 73:
   * migrating KPI jobs to lillypilly
   * internal items
   * UC15 updates
   * organizational and technical documentation
   * sprint prep
Line 81: Line 77:
   * security update publishing    * gdk-pixbuf updates
Line 90: Line 86:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2017/ubuntu-meeting-2.2017-08-28-16.38.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-11-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Sep 11th 2017 16:31 UTC

  • End: 16:50 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • ratliff
  • leosilva

Not present

  • chrisccoulson

Agenda

  • Announcements
    • Gianfranco Costamagna provided a debdiff for xenial for check-all-the-things (LP: #1597245)

    • Simon Quigley (tsimonq2) provided a debdiff for xenial for karchive (LP: #1712948)

    • James Cowgill (jcowgill) provided debdiffs for xenial and zesty for mbedtls (LP: #1714640)

  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • update the review tools
        • new license yaml
        • better error reporting
        • misc fixes
      • snapd layouts feature PR reviews (PR 3621)
      • investigate device cgroup issues in snapd
      • misc snapd policy updates
      • start next steps of uid/gid work in snapd
    • mdeslaur
      • weekly role: happy place
      • post-vacation catchup
      • qemu updates
      • security updates
    • sbeattie
      • weekly role: happy place
      • embargoed issues
      • libxmls2 update
      • kernel CVE triage
      • QRT and AppArmor bugs to investigate

    • tyhicks
      • weekly role: happy place
      • attend Linux Security Summit
      • package fscrypt 0.2.1
      • test LSM stacking patches
      • attend to libsecomp PR once the review starts
    • jjohansen
      • attend Linux Plumbers and Linux Security Summit
        • prep presentations/discussions around AppArmor, LSM stacking, and LSM namespacing

    • sarnold
      • weekly role: bug triage
      • help with AppArmor kernel patch reviews

      • nghttp2 MIR
      • python elftools MIR
    • ChrisCoulson

      • finish updating rustc to 1.19
      • start on updating rustc to 1.20
      • thunderbird update
      • sponsor chromium-browser update
      • fix bugs for Firefox 56
        • menubar
        • FTBFS on Trusty
        • armhf issue
    • ratliff
      • weekly role: community
      • organizational and technical documentation
      • sprint prep
    • leosilva
      • weekly role: cve triage
      • gdk-pixbuf updates
      • pick up security updates
  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-11-16.31.moin.txt

MeetingLogs/Security/20171204 (last edited 2017-12-04 16:57:57 by tyhicks)