20180212
Size: 3391
Comment:
|
← Revision 77 as of 2018-02-12 17:02:24 ⇥
Size: 2332
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170710 ## page was copied from MeetingLogs/Security/20170626 |
## page was copied from MeetingLogs/Security/20180205 |
Line 5: | Line 4: |
* '''When''': Mon July 10th 2017 16:29 UTC * '''End''': 16:42 UTC |
* '''When''': Mon Feb 12th 2018 16:36 UTC * '''End''': 16:58 UTC |
Line 12: | Line 11: |
* mdeslaur | |
Line 14: | Line 14: |
* jjohansen * sarnold |
|
Line 15: | Line 17: |
* ratliff | |
Line 19: | Line 20: |
* mdeslaur * jjohansen * sarnold |
* ratliff |
Line 25: | Line 24: |
* Otto Kekäläinen (otto) provided updates for trusty for mariadb-5.5 (LP: #Bug:1698689) | * Jeremy Bicha provided a debdiff for xenial for brotli (LP: #Bug:1737364) |
Line 28: | Line 27: |
* be involved in various snappy PRs and feature discussions * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * sprint prep * wayland interface, as time allows {{{#!wiki comment |
* snapd PR reviews * layouts * portals * steam-support interface * lxd snap regression wrt confinement * LSM stacking demo * create screencast interface * stric mode snaps on livecd |
Line 36: | Line 37: |
* apache2 updates * additional security updates as time allows |
* exim updates * php7.0 updates * puppet updates * sbeattie * weekly role: community * look into enabling retpoline compiler options by default in Bionic * inspect i386 builds to ensure that everything is being done properly on that arch * gcc retpoline backports for 12.04 ESM * tyhicks * address issues found by team members in the new USN website and the USN publishing process around it * LSM stacking demo * embargoed issue * internal tasks * jjohansen * !AppArmor bugs * target domain name bug * stacking bug for px transitions * update bionic LSM stacking patches with the latest upstream revision * !AppArmor community meeting * sarnold * weekly role: CVE triage * openjpeg2 MIR * additional MIRs * !ChrisCoulson * firefox updates * ubuntu-drivers-common updates * !AppArmor auditing changes {{{#!wiki comment * ratliff * weekly role: bug triage * internal work * KPI improvements |
Line 39: | Line 70: |
* sbeattie * weekly role: CVE triage * security updates * !AppArmor patch review * kernel CVE triage * tyhicks |
* leosilva |
Line 46: | Line 72: |
* fscrypt evaluation * sprint prep * CVE tracking in snaps * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment * jjohansen * kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} {{{#!wiki comment * sarnold * weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} * !ChrisCoulson * chromium-browser update * rust transition for future firefox updates * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is * ratliff * weekly role: community * sponsor vlc updates * sprint prep * sizing effort and other internal tasks * Ubuntu Core 15 updates * leosilva * publish 12.04 ESM updates * libgcrypt * expat * libtiff * bind9 * finish testing 12.04 ESM updates * jbig2 * openldap * shadow sarnold in bug triage duties |
* wavpack * additional security updates |
Line 93: | Line 75: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 96: | Line 77: |
* none | * None |
Line 99: | Line 80: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-07-10-16.29.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-02-12-16.36.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Feb 12th 2018 16:36 UTC
End: 16:58 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- leosilva
Not present
- ratliff
Agenda
- Announcements
Jeremy Bicha provided a debdiff for xenial for brotli (LP: #1737364)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd PR reviews
- layouts
- portals
- steam-support interface
- lxd snap regression wrt confinement
- LSM stacking demo
- create screencast interface
- stric mode snaps on livecd
- snapd PR reviews
- mdeslaur
- weekly role: happy place
- exim updates
- php7.0 updates
- puppet updates
- sbeattie
- weekly role: community
- look into enabling retpoline compiler options by default in Bionic
- inspect i386 builds to ensure that everything is being done properly on that arch
- gcc retpoline backports for 12.04 ESM
- tyhicks
- address issues found by team members in the new USN website and the USN publishing process around it
- LSM stacking demo
- embargoed issue
- internal tasks
- jjohansen
AppArmor bugs
- target domain name bug
- stacking bug for px transitions
- update bionic LSM stacking patches with the latest upstream revision
AppArmor community meeting
- sarnold
- weekly role: CVE triage
- openjpeg2 MIR
- additional MIRs
ChrisCoulson
- firefox updates
- ubuntu-drivers-common updates
AppArmor auditing changes
- leosilva
- weekly role: happy place
- wavpack
- additional security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-02-12-16.36.moin.txt
MeetingLogs/Security/20180212 (last edited 2018-02-12 17:02:24 by tyhicks)