20180521
3336
Comment:
|
← Revision 99 as of 2018-05-24 15:15:54 ⇥
2136
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170814 == Meeting (DRAFT) == |
## page was copied from MeetingLogs/Security/20180507 ## page was copied from MeetingLogs/Security/20180423 == Meeting == |
Line 4: | Line 5: |
* '''When''': Mon Aug 28th 2017 16:30 UTC * '''End''': 16:50 UTC |
* '''When''': Mon May 21 16:32:35 2018 UTC * '''End''': 16:45:19 |
Line 7: | Line 8: |
* '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
Line 10: | Line 11: |
* jdstrand {{{#!wiki comment * mdeslaur }}} |
|
Line 11: | Line 16: |
* tyhicks | |
Line 15: | Line 19: |
* leosilva | |
Line 16: | Line 21: |
* leosilva | |
Line 19: | Line 23: |
* jdstrand | |
Line 24: | Line 27: |
* Simon Quigley (tsimonq2) provided a debdiff for trusty for kdepimlibs (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided a debdiff for xenial for kcoreaddons (LP: #Bug:1630700) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for varnish (LP: #Bug:1708354) |
* Generalist role rotation * CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold * Contributions * None this week |
Line 28: | Line 32: |
{{{#!wiki comment | |
Line 30: | Line 33: |
* finish going through the wayland interface * update !AppArmor to fix evince crash on startup in Artful * be responsive to various snappy PRs and feature discussions * Solus distro support * udev tagging * portals * layouts * race-free profile generation next steps * dbus sessions sevices * add an exec stack check in the review tools * push forward snapd users/groups design * add systemd-notify interface as time permits |
* look into options for linkat/apparmor bug #1772097 * miscellaneous policy updates * resquashfs failures (followup with upstream, review-tools updates, etc) * anbox-support interface * finish part ii of phase 1 of snap USNs {{{#!wiki comment |
Line 43: | Line 40: |
* weekly role: bug triage * postgresql updates * test long standing security updates in the security PPA |
* qpdf and cups-filters updates * webkit2gtk updates |
Line 47: | Line 43: |
}}} | }}} |
Line 49: | Line 45: |
* weekly role: cve triage | * kernel CVE triage * embargoed issue * updates * jjohansen * reviewing some LSM stacking and apparmor networking patches * travel to openSUSE Conference and present on [[https://events.opensuse.org/conference/oSC18/program/proposal/1936|LSM stacking]] and AppArmor * sarnold * MIRs * gce-compute-image-packages is in progress * fprintd next * profiling some pcp daemons * !ChrisCoulson * rust 1.26.0 updates * chromium-browser updates * thunderbolt updates * ratliff * embargoed and internal work * leosilva * xdg-utils update publication |
Line 51: | Line 65: |
* openjdk-7 to sponsor * pick up others * !AppArmor reviews * minor QRT backlog of issues * tyhicks * weekly role: happy place * finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging * jjohansen * !AppArmor kernel patch upstreaming * minor cleanups before submitting 4.14 pull request * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey * sarnold * weekly role: happy place * !AppArmor kernel patch review as needed * pcp MIR * !ChrisCoulson * firefox update (55.0.1) * firefox update (55.0.2) * update rustc to 1.19 * ratliff * weekly role: happy place * preparing more KPIs * documenting our KPIs * leosilva * weekly role: community * libgd2 updates * pick up security updates |
|
Line 81: | Line 66: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 87: | Line 71: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-14-16.30.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-05-21-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon May 21 16:32:35 2018 UTC
End: 16:45:19
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
- leosilva
- ratliff
Not present
- mdeslaur
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
- Contributions
- None this week
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- look into options for linkat/apparmor bug #1772097
- miscellaneous policy updates
- resquashfs failures (followup with upstream, review-tools updates, etc)
- anbox-support interface
- finish part ii of phase 1 of snap USNs
- sbeattie
- kernel CVE triage
- embargoed issue
- updates
- jjohansen
- reviewing some LSM stacking and apparmor networking patches
travel to openSUSE Conference and present on LSM stacking and AppArmor
- sarnold
- MIRs
- gce-compute-image-packages is in progress
- fprintd next
- profiling some pcp daemons
- MIRs
ChrisCoulson
- rust 1.26.0 updates
- chromium-browser updates
- thunderbolt updates
- ratliff
- embargoed and internal work
- leosilva
- xdg-utils update publication
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-05-21-16.32.moin.txt
MeetingLogs/Security/20180521 (last edited 2018-05-24 15:15:54 by emilyr)