20180226
Size: 3384
Comment:
|
Size: 3155
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
== Meeting (DRAFT) == | == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon June 26th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon June 26th 2017 16:32 UTC * '''End''': 16:46 UTC |
Line 14: | Line 14: |
* sarnold | |
Line 21: | Line 20: |
* sarnold | |
Line 27: | Line 27: |
* respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * PR reviews for fixing racy profile generation * bpf caching * system-key |
|
Line 33: | Line 28: |
* finish testing and respond to feedback | |
Line 38: | Line 34: |
* wayland interface, as time allows | |
Line 40: | Line 37: |
* release glibc and exim4 updates * ruby updates |
* apache2 updates |
Line 45: | Line 41: |
* embargoed issue | * kernel USN publication * kernel CVE triage |
Line 47: | Line 44: |
* add UCT tracking for some new kernels | * openssh update * !AppArmor patch review |
Line 50: | Line 48: |
* !eCryptfs patch review (userspace and kernel) | |
Line 53: | Line 50: |
* book upcoming travel * help leosilva with the update publishing process and possibly with the bug triage role |
* !eCryptfs patch review (userspace and kernel) |
Line 68: | Line 64: |
{{{#!wiki comment | |
Line 73: | Line 70: |
}}} | |
Line 74: | Line 72: |
* embargoed issue | |
Line 75: | Line 74: |
* test new respin builds * chromium update to test and publish |
|
Line 76: | Line 77: |
* embargoed issue | * see how feasible patch backporting is |
Line 80: | Line 81: |
* technical content and reporting | |
Line 82: | Line 82: |
* finished testing a libnl3 update for 12.04 ESM * publish it soon * pick up another security update * train for one of the generalist's roles |
* finish shadow testing * shadow sarnold in bug triage duties |
Line 93: | Line 91: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-19-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon June 26th 2017 16:32 UTC
End: 16:46 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- chrisccoulson
- ratliff
- leosilva
Not present
- jjohansen
- sarnold
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- password-manager-service interface PR
- finish testing and respond to feedback
- finish overlayfs/apparmor/snaps investigation
- file overlay/apparmor bugs
- snappy-debug work
- fix to work with journald
- miscellaneous snappy policy updates PR
- wayland interface, as time allows
- password-manager-service interface PR
- mdeslaur
- weekly role: happy place
- apache2 updates
- additional security updates as time allows
- sbeattie
- weekly role: happy place
- kernel USN publication
- kernel CVE triage
- sudo update
- openssh update
AppArmor patch review
- tyhicks
- weekly role: community
- fscrypt evaluation
- seccomp patches
- !eCryptfs patch review (userspace and kernel)
ChrisCoulson
- embargoed issue
- thunderbird update
- test new respin builds
- chromium update to test and publish
- investigate spidermonkey/gjs maintenance plan
- see how feasible patch backporting is
- ratliff
- weekly role: CVE triage
- Ubuntu Core 15 updates
- leosilva
- finish shadow testing
- shadow sarnold in bug triage duties
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- none
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt
MeetingLogs/Security/20180226 (last edited 2018-02-26 16:57:50 by tyhicks)