20180604
3246
Comment:
|
← Revision 101 as of 2018-06-04 17:41:32 ⇥
2358
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from MeetingLogs/Security/20170605 == Meeting (DRAFT) == |
== Meeting == |
Line 4: | Line 3: |
* '''When''': Mon June 12th 2017 16:31 UTC * '''End''': 16:48 UTC |
* '''When''': Mon Jun 4 16:31:59 2018 UTC * '''End''': 16:46:03 |
Line 7: | Line 6: |
* '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
Line 13: | Line 12: |
* tyhicks | |
Line 17: | Line 15: |
* leosilva | |
Line 18: | Line 17: |
* leosilva | |
Line 21: | Line 19: |
{{{#!wiki comment * mdeslaur }}} |
|
Line 22: | Line 23: |
Line 25: | Line 25: |
* Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249) * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091) * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722) |
* Generalist role rotation * CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur * Contributions * None this week |
Line 30: | Line 31: |
* finish overlayfs/apparmor/snaps investigation * snappy-debug work * fix to work with journald * update for snapd 2.25/2.26 * gnome3/wayland/plasma interfaces * snappy forum discussions and PR reviews * miscellaneous snappy policy updates PR |
* turn on resquashfs tests. review-tools work to add an override mechanism * iterate on various PRs submitted last week related to udev * adjust snap-confine to always use a device cgroup * work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface * go through the anbox design and think through what proper confinement might look like * pick up review-tools snap USNs phase1/part ii work as have time {{{#!wiki comment }}} * mdeslaur * published exempi updates this morning * in the process of publishing an apport update for 14.04 * security updates * sbeattie * git update * kernel CVE triage |
Line 38: | Line 47: |
* mdeslaur * weekly role: community * puppet updates * libtasn updates * additional security updates as time allows * sbeattie * weekly role: bug Triage * embargoed issue * sudo update * kernel triage bits * tyhicks * weekly role: CVE triage * !eCryptfs patch review (userspace and kernel) * seccomp patches * finish elfutils updates * pick up security update |
* updates |
Line 55: | Line 49: |
* LSS talk/discussion proposal * LSS program committee duties * !AppArmor kernel patch upstreaming * merge against security tree * some remaining work before the pull request can be sent * work with SUSE regarding the AppArmor patches for 4.13 kernel |
* apparmor pull request for 4.18. * kernel compatibility networking patches for the apparmor 2.x series * review mjg's networking patches * work on apparmor 3.0 release * caching bugs |
Line 62: | Line 55: |
* weekly role: happy place * sponsor two updates from last week * xdelta3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* MIRs * gce-compute-image-packages should finish this week * fprintd next * profiling some pcp daemons |
Line 67: | Line 60: |
* Firefox updates * sponsor chromium-browser updates * embargoed issue * work on the Firefox start page * move away start.ubuntu.com * provide Ubuntu-specific design once we hear back |
* chromium-browser updates * thunderbird updates |
Line 74: | Line 63: |
* weekly role: happy place * internal tasks * technical communication * Ubuntu Core 15 updates |
* embargoed and internal work * leosilva * procps update publication for Precise ESM * liblouis updates * security updates |
Line 79: | Line 69: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 82: | Line 71: |
* none | * None |
Line 85: | Line 74: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-05-16.31.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Jun 4 16:31:59 2018 UTC
End: 16:46:03
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
- leosilva
- ratliff
Not present
- None
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur
- Contributions
- None this week
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- turn on resquashfs tests. review-tools work to add an override mechanism
- iterate on various PRs submitted last week related to udev
- adjust snap-confine to always use a device cgroup
- work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface
- go through the anbox design and think through what proper confinement might look like
- pick up review-tools snap USNs phase1/part ii work as have time
- mdeslaur
- published exempi updates this morning
- in the process of publishing an apport update for 14.04
- security updates
- sbeattie
- git update
- kernel CVE triage
- embargoed issue
- updates
- jjohansen
- apparmor pull request for 4.18.
- kernel compatibility networking patches for the apparmor 2.x series
- review mjg's networking patches
- work on apparmor 3.0 release
- caching bugs
- sarnold
- MIRs
- gce-compute-image-packages should finish this week
- fprintd next
- profiling some pcp daemons
- MIRs
ChrisCoulson
- chromium-browser updates
- thunderbird updates
- ratliff
- embargoed and internal work
- leosilva
- procps update publication for Precise ESM
- liblouis updates
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt
MeetingLogs/Security/20180604 (last edited 2018-06-04 17:41:32 by emilyr)