20180604

Differences between revisions 1 and 101 (spanning 100 versions)
Revision 1 as of 2017-06-12 16:30:40
Size: 3246
Editor: tyhicks
Comment:
Revision 101 as of 2018-06-04 17:41:32
Size: 2358
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from MeetingLogs/Security/20170605
== Meeting (DRAFT) ==
== Meeting ==
Line 4: Line 3:
 * '''When''': Mon June 12th 2017 16:31 UTC
 * '''End''': 16:48 UTC
 * '''When''':  Mon Jun 4 16:31:59 2018 UTC
 * '''End''': 16:46:03
Line 7: Line 6:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 13: Line 12:
 * tyhicks
Line 17: Line 15:
 * leosilva
Line 18: Line 17:
 * leosilva
Line 21: Line 19:
 {{{#!wiki comment
 * mdeslaur
 }}}
Line 22: Line 23:
Line 25: Line 25:
  * Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249)
  * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091)
  * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722)
  * Generalist role rotation
   * CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur
  * Contributions
   * None this week
Line 30: Line 31:
   * finish overlayfs/apparmor/snaps investigation
   * snappy-debug work
    * fix to work with journald
    * update for snapd 2.25/2.26
   * gnome3/wayland/plasma interfaces
   * snappy forum discussions and PR reviews
   * miscellaneous snappy policy updates PR
   * turn on resquashfs tests. review-tools work to add an override mechanism
   * iterate on various PRs submitted last week related to udev
   * adjust snap-confine to always use a device cgroup
   * work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface
   * go through the anbox design and think through what proper confinement might look like
   * pick up review-tools snap USNs phase1/part ii work as have time
 {{{#!wiki comment
 }}}
  * mdeslaur
   * published exempi updates this morning
   * in the process of publishing an apport update for 14.04
   * security updates
  * sbeattie
   * git update
   * kernel CVE triage
Line 38: Line 47:
  * mdeslaur
   * weekly role: community
   * puppet updates
   * libtasn updates
   * additional security updates as time allows
  * sbeattie
   * weekly role: bug Triage
   * embargoed issue
   * sudo update
   * kernel triage bits
  * tyhicks
   * weekly role: CVE triage
   * !eCryptfs patch review (userspace and kernel)
   * seccomp patches
   * finish elfutils updates
   * pick up security update
   * updates
Line 55: Line 49:
   * LSS talk/discussion proposal
   * LSS program committee duties
   * !AppArmor kernel patch upstreaming
    * merge against security tree
    * some remaining work before the pull request can be sent
   * work with SUSE regarding the AppArmor patches for 4.13 kernel
   * apparmor pull request for 4.18.
   * kernel compatibility networking patches for the apparmor 2.x series
   * review mjg's networking patches
   * work on apparmor 3.0 release
   * caching bugs
Line 62: Line 55:
   * weekly role: happy place
   * sponsor two updates from last week
   * xdelta3 mir
   * !AppArmor patch review to support jjohansen's upstreaming work
   * MIRs
    * gce-compute-image-packages should finish this week
    * fprintd next
   * profiling some pcp daemons
Line 67: Line 60:
   * Firefox updates
   * sponsor chromium-browser updates
   * embargoed issue
   * work on the Firefox start page
    * move away start.ubuntu.com
    * provide Ubuntu-specific design once we hear back
   * chromium-browser updates
   * thunderbird updates
Line 74: Line 63:
   * weekly role: happy place
   * internal tasks
   * technical communication
   * Ubuntu Core 15 updates
   * embargoed and internal work
  * leosilva
   * procps update publication for Precise ESM
   * liblouis updates
   * security updates
Line 79: Line 69:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 82: Line 71:
  * none   * None
Line 85: Line 74:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-05-16.31.moin.txt http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Jun 4 16:31:59 2018 UTC

  • End: 16:46:03

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • jjohansen
  • sarnold
  • chrisccoulson
  • leosilva
  • ratliff

Not present

  • None

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur
    • Contributions
      • None this week
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • turn on resquashfs tests. review-tools work to add an override mechanism
      • iterate on various PRs submitted last week related to udev
      • adjust snap-confine to always use a device cgroup
      • work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface
      • go through the anbox design and think through what proper confinement might look like
      • pick up review-tools snap USNs phase1/part ii work as have time
    • mdeslaur
      • published exempi updates this morning
      • in the process of publishing an apport update for 14.04
      • security updates
    • sbeattie
      • git update
      • kernel CVE triage
      • embargoed issue
      • updates
    • jjohansen
      • apparmor pull request for 4.18.
      • kernel compatibility networking patches for the apparmor 2.x series
      • review mjg's networking patches
      • work on apparmor 3.0 release
      • caching bugs
    • sarnold
      • MIRs
        • gce-compute-image-packages should finish this week
        • fprintd next
      • profiling some pcp daemons
    • ChrisCoulson

      • chromium-browser updates
      • thunderbird updates
    • ratliff
      • embargoed and internal work
    • leosilva
      • procps update publication for Precise ESM
      • liblouis updates
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt

MeetingLogs/Security/20180604 (last edited 2018-06-04 17:41:32 by emilyr)