20180604

Differences between revisions 2 and 101 (spanning 99 versions)
Revision 2 as of 2017-06-12 16:58:59
Size: 3317
Editor: tyhicks
Comment:
Revision 101 as of 2018-06-04 17:41:32
Size: 2358
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from MeetingLogs/Security/20170605
Line 4: Line 3:
 * '''When''': Mon June 12th 2017 16:36 UTC
 * '''End''': 16:57 UTC
 * '''When''':  Mon Jun 4 16:31:59 2018 UTC
 * '''End''': 16:46:03
Line 7: Line 6:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 13: Line 12:
 * tyhicks
Line 17: Line 15:
 * leosilva
Line 18: Line 17:
 * leosilva
Line 21: Line 19:
 {{{#!wiki comment
 * mdeslaur
 }}}
Line 22: Line 23:
Line 25: Line 25:
  * Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249)
  * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091)
  * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722)
  * leosilva has joined the Ubuntu Security Team
  * Generalist role rotation
   * CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur
  * Contributions
   * None this week
Line 31: Line 31:
   * PR reviews for fixing racy profile generation
    * bpf caching
    * system-key
   * respond to greengrass-support interface feedback
    * iterate on the policy once a devmode snap is available
   * password-manager-service interface PR
   * finish overlayfs/apparmor/snaps investigation
    * file overlay/apparmor bugs
   * snappy-debug work
    * fix to work with journald
   * miscellaneous snappy policy updates PR
   * turn on resquashfs tests. review-tools work to add an override mechanism
   * iterate on various PRs submitted last week related to udev
   * adjust snap-confine to always use a device cgroup
   * work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface
   * go through the anbox design and think through what proper confinement might look like
   * pick up review-tools snap USNs phase1/part ii work as have time
 {{{#!wiki comment
 }}}
Line 43: Line 40:
   * weekly role: community
   * gnutls updates
   * libiberty updates
   * additional security updates as time allows
   * published exempi updates this morning
   * in the process of publishing an apport update for 14.04
   * security updates
Line 48: Line 44:
   * weekly role: bug Triage    * git update
   * kernel CVE triage
Line 50: Line 47:
   * sudo update
   * add UCT tracking for some new kernels
  * tyhicks
   * weekly role: CVE triage
   * !eCryptfs patch review (userspace and kernel)
   * fscrypto evaluation
   * seccomp patches
   * updates
Line 58: Line 49:
   * upstream linux-security-module reviews
    * new revision of LSM stacking patches
    * path based LSM changes from Tetsuo
   * LSS program committee duties
   * work with SUSE regarding the AppArmor patches for 4.13 kernel
   * !AppArmor kernel patch upstreaming
    * start preparing patches for 4.14
   * apparmor pull request for 4.18.
   * kernel compatibility networking patches for the apparmor 2.x series
   * review mjg's networking patches
   * work on apparmor 3.0 release
   * caching bugs
Line 66: Line 55:
   * weekly role: happy place
   * xdelta3 mir
   * gdm3 mir
   * !AppArmor patch review to support jjohansen's upstreaming work
   * MIRs
    * gce-compute-image-packages should finish this week
    * fprintd next
   * profiling some pcp daemons
Line 71: Line 60:
   * Firefox updates
   * sponsor
chromium-browser updates
   * embargoed issues
   * chromium-browser updates
   * thunderbird updates
Line 75: Line 63:
   * weekly role: happy place
   * Ubuntu Core 15 updates
   * CVE notifications
   * embargoed and internal work
Line 79: Line 65:
   * new employee tasks    * procps update publication for Precise ESM
   * liblouis updates
   * security updates
Line 81: Line 69:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 84: Line 71:
  * none   * None
Line 87: Line 74:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-12-16.36.moin.txt  http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Jun 4 16:31:59 2018 UTC

  • End: 16:46:03

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • jjohansen
  • sarnold
  • chrisccoulson
  • leosilva
  • ratliff

Not present

  • None

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: leosilva, Bug Triage: sarnold, Community: ratliff, Happy Place: sbeattie, mdeslaur
    • Contributions
      • None this week
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • turn on resquashfs tests. review-tools work to add an override mechanism
      • iterate on various PRs submitted last week related to udev
      • adjust snap-confine to always use a device cgroup
      • work through design considerations with Gustavo Niemeyer with respect to update-alternatives (or something similar) snapd interface
      • go through the anbox design and think through what proper confinement might look like
      • pick up review-tools snap USNs phase1/part ii work as have time
    • mdeslaur
      • published exempi updates this morning
      • in the process of publishing an apport update for 14.04
      • security updates
    • sbeattie
      • git update
      • kernel CVE triage
      • embargoed issue
      • updates
    • jjohansen
      • apparmor pull request for 4.18.
      • kernel compatibility networking patches for the apparmor 2.x series
      • review mjg's networking patches
      • work on apparmor 3.0 release
      • caching bugs
    • sarnold
      • MIRs
        • gce-compute-image-packages should finish this week
        • fprintd next
      • profiling some pcp daemons
    • ChrisCoulson

      • chromium-browser updates
      • thunderbird updates
    • ratliff
      • embargoed and internal work
    • leosilva
      • procps update publication for Precise ESM
      • liblouis updates
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-04-16.31.moin.txt

MeetingLogs/Security/20180604 (last edited 2018-06-04 17:41:32 by emilyr)