20171204
3155
Comment:
|
3573
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170619 | ## page was copied from MeetingLogs/Security/20170828 ## page was copied from MeetingLogs/Security/20170814 |
Line 4: | Line 5: |
* '''When''': Mon June 26th 2017 16:32 UTC * '''End''': 16:46 UTC * '''Where''': #ubuntu-meeting on irc.freenode.net |
* '''When''': Mon Aug 28th 2017 16:38 UTC * '''End''': 16:55 UTC * '''Where''': #ubuntu-meeting-2 on irc.freenode.net |
Line 10: | Line 11: |
* jdstrand * mdeslaur |
|
Line 14: | Line 13: |
* chrisccoulson | * jjohansen * sarnold |
Line 19: | Line 19: |
* jjohansen * sarnold |
* jdstrand * mdeslaur * chrisccoulson |
Line 24: | Line 25: |
* None | * Simon Quigley (tsimonq2) provided a debdiff for trusty for kdepimlibs (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided a debdiff for xenial for kcoreaddons (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for varnish (LP: #Bug:1708354) |
Line 26: | Line 29: |
{{{#!wiki comment | |
Line 27: | Line 31: |
* password-manager-service interface PR * finish testing and respond to feedback * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR * wayland interface, as time allows |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
Line 36: | Line 44: |
* weekly role: bug triage * postgresql updates * test long standing security updates in the security PPA * security updates }}} * sbeattie * weekly role: community * kernel USNs to publish * kernel CVE triage * embargoed issue to investigate * security updates * QRT and !AppArmor bugs to investigate * tyhicks * weekly role: bug triage * finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging * jjohansen * !AppArmor Artful kernel bug for apparmorfs perms (LP: #Bug:1713103) * !AppArmor parser failures reported by cboltz * !AppArmor regression test updates * Plumbers/LSS prep * !AppArmor kernel patch upstreaming * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey * sarnold |
|
Line 37: | Line 70: |
* apache2 updates * additional security updates as time allows * sbeattie |
* spice-html5 MIR {{{#!wiki comment * !ChrisCoulson * firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 }}} * ratliff * weekly role: cve triage * migrating KPI jobs to lillypilly * internal items * UC15 updates * leosilva |
Line 41: | Line 84: |
* kernel USN publication * kernel CVE triage * sudo update * openssh update * !AppArmor patch review * tyhicks * weekly role: community * fscrypt evaluation * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment * jjohansen * kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} {{{#!wiki comment * sarnold * weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} * !ChrisCoulson * embargoed issue * thunderbird update * test new respin builds * chromium update to test and publish * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is * ratliff * weekly role: CVE triage * Ubuntu Core 15 updates * leosilva * finish shadow testing * shadow sarnold in bug triage duties |
* security update publishing * pick up security updates |
Line 88: | Line 90: |
* none | * None |
Line 91: | Line 93: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2017/ubuntu-meeting-2.2017-08-28-16.38.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Aug 28th 2017 16:38 UTC
End: 16:55 UTC
Where: #ubuntu-meeting-2 on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- sbeattie
- tyhicks
- jjohansen
- sarnold
- ratliff
- leosilva
Not present
- jdstrand
- mdeslaur
- chrisccoulson
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- sbeattie
- weekly role: community
- kernel USNs to publish
- kernel CVE triage
- embargoed issue to investigate
- security updates
QRT and AppArmor bugs to investigate
- tyhicks
- weekly role: bug triage
- finish making changes to seccomp v6 kernel patch set, test, and submit upstream
- fscrypt pam module review and packaging
- jjohansen
AppArmor Artful kernel bug for apparmorfs perms (LP: #1713103)
AppArmor parser failures reported by cboltz
AppArmor regression test updates
- Plumbers/LSS prep
AppArmor kernel patch upstreaming
- type splitting to fix stored path issue in UNIX mediation
- testing of LSM stacking and get feedback to Casey
- sarnold
- weekly role: happy place
- spice-html5 MIR
- ratliff
- weekly role: cve triage
- migrating KPI jobs to lillypilly
- internal items
- UC15 updates
- leosilva
- weekly role: happy place
- security update publishing
- pick up security updates
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2017/ubuntu-meeting-2.2017-08-28-16.38.moin.txt
MeetingLogs/Security/20171204 (last edited 2017-12-04 16:57:57 by tyhicks)