20171204
3384
Comment:
|
3231
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170619 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20170911 ## page was copied from MeetingLogs/Security/20170828 == Meeting == |
Line 4: | Line 5: |
* '''When''': Mon June 26th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Sep 11th 2017 16:31 UTC * '''End''': 16:50 UTC |
Line 14: | Line 15: |
* jjohansen | |
Line 15: | Line 17: |
* chrisccoulson | |
Line 20: | Line 21: |
* jjohansen | * chrisccoulson |
Line 24: | Line 25: |
* None | * Gianfranco Costamagna provided a debdiff for xenial for check-all-the-things (LP: #Bug:1597245) * Simon Quigley (tsimonq2) provided a debdiff for xenial for karchive (LP: #Bug:1712948) * James Cowgill (jcowgill) provided debdiffs for xenial and zesty for mbedtls (LP: #Bug:1714640) |
Line 27: | Line 30: |
* respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * PR reviews for fixing racy profile generation * bpf caching * system-key * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* update the review tools * new license yaml * better error reporting * misc fixes * snapd layouts feature PR reviews (PR 3621) * investigate device cgroup issues in snapd * misc snapd policy updates * start next steps of uid/gid work in snapd |
Line 40: | Line 40: |
* release glibc and exim4 updates * ruby updates * additional security updates as time allows |
* post-vacation catchup * qemu updates * security updates |
Line 45: | Line 45: |
* embargoed issue * sudo update * add UCT tracking for some new kernels |
* embargoed issues * libxmls2 update * kernel CVE triage * QRT and !AppArmor bugs to investigate |
Line 49: | Line 50: |
* weekly role: community * !eCryptfs patch review (userspace and kernel) * fscrypt evaluation * seccomp patches * book upcoming travel * help leosilva with the update publishing process and possibly with the bug triage role {{{#!wiki comment |
* weekly role: happy place * attend Linux Security Summit * package fscrypt 0.2.1 * test LSM stacking patches * attend to libsecomp PR once the review starts |
Line 57: | Line 56: |
* kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} |
* attend Linux Plumbers and Linux Security Summit * prep presentations/discussions around !AppArmor, LSM stacking, and LSM namespacing |
Line 70: | Line 60: |
* xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* help with !AppArmor kernel patch reviews * nghttp2 MIR * python elftools MIR |
Line 74: | Line 64: |
* finish updating rustc to 1.19 * start on updating rustc to 1.20 |
|
Line 75: | Line 67: |
* investigate spidermonkey/gjs maintenance plan * embargoed issue |
* sponsor chromium-browser update * fix bugs for Firefox 56 * menubar * FTBFS on Trusty * armhf issue |
Line 78: | Line 73: |
* weekly role: CVE triage * Ubuntu Core 15 updates * technical content and reporting |
* weekly role: community * organizational and technical documentation * sprint prep |
Line 82: | Line 77: |
* finished testing a libnl3 update for 12.04 ESM * publish it soon * pick up another security update * train for one of the generalist's roles |
* weekly role: cve triage * gdk-pixbuf updates * pick up security updates |
Line 90: | Line 84: |
* none | * None |
Line 93: | Line 87: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-19-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-11-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Sep 11th 2017 16:31 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- ratliff
- leosilva
Not present
- chrisccoulson
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- update the review tools
- new license yaml
- better error reporting
- misc fixes
- snapd layouts feature PR reviews (PR 3621)
- investigate device cgroup issues in snapd
- misc snapd policy updates
- start next steps of uid/gid work in snapd
- update the review tools
- mdeslaur
- weekly role: happy place
- post-vacation catchup
- qemu updates
- security updates
- sbeattie
- weekly role: happy place
- embargoed issues
- libxmls2 update
- kernel CVE triage
QRT and AppArmor bugs to investigate
- tyhicks
- weekly role: happy place
- attend Linux Security Summit
- package fscrypt 0.2.1
- test LSM stacking patches
- attend to libsecomp PR once the review starts
- jjohansen
- attend Linux Plumbers and Linux Security Summit
prep presentations/discussions around AppArmor, LSM stacking, and LSM namespacing
- attend Linux Plumbers and Linux Security Summit
- sarnold
- weekly role: bug triage
help with AppArmor kernel patch reviews
- nghttp2 MIR
- python elftools MIR
ChrisCoulson
- finish updating rustc to 1.19
- start on updating rustc to 1.20
- thunderbird update
- sponsor chromium-browser update
- fix bugs for Firefox 56
- menubar
- FTBFS on Trusty
- armhf issue
- ratliff
- weekly role: community
- organizational and technical documentation
- sprint prep
- leosilva
- weekly role: cve triage
- gdk-pixbuf updates
- pick up security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-11-16.31.moin.txt
MeetingLogs/Security/20171204 (last edited 2017-12-04 16:57:57 by tyhicks)