20180813

Differences between revisions 1 and 105 (spanning 104 versions)
Revision 1 as of 2017-06-12 16:30:40
Size: 3246
Editor: tyhicks
Comment:
Revision 105 as of 2018-06-25 17:21:08
Size: 2099
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from MeetingLogs/Security/20170605
== Meeting (DRAFT) ==
== Meeting ==
Line 4: Line 3:
 * '''When''': Mon June 12th 2017 16:31 UTC
 * '''End''': 16:48 UTC
 * '''When''':  Mon Jun 25 16:31:11 2018 UTC
 * '''End''': 16:45:09
Line 7: Line 6:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 11: Line 10:
 {{{#!wiki comment
Line 12: Line 12:
 }}}
Line 13: Line 14:
 * tyhicks  {{{#!wiki comment
Line 15: Line 16:
 }}}
Line 17: Line 19:
 * leosilva
Line 18: Line 21:
 * leosilva
Line 21: Line 23:
 * None  {{{#!wiki comment
 }}}
 * mdeslaur
 * jjohansen
 * amurray
Line 25: Line 31:
  * Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249)
  * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091)
  * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722)
  * Generalist role rotation
   * CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
  * We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users!
  * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]]
Line 30: Line 37:
   * finish overlayfs/apparmor/snaps investigation
   * snappy-debug work
    * fix to work with journald
    * update for snapd 2.25/2.26
   * gnome3/wayland/plasma interfaces
   * snappy forum discussions and PR reviews
   * miscellaneous snappy policy updates PR
   * embargoed issue
   * snapd PR reviews
   * adjust snap-confine to always use a device cgroup
   * follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement
   * pick up review-tools snap USNs phase1/part ii work as have time
 {{{#!wiki comment
Line 39: Line 43:
   * weekly role: community
   * puppet updates
   * libtasn updates
   * additional security updates as time allows
   * massive imagemagick update
   * security updates
 }}}
Line 44: Line 47:
   * weekly role: bug Triage
   * embargoed issue
   * sudo update
   * kernel triage bits
  * tyhicks
   * weekly role: CVE triage
   * !eCryptfs patch review (userspace and kernel)
   * seccomp patches
   * finish elfutils updates
   * pick up security update
   * kernel signoffs and fix kernel qrt test failures
   * finish the conversion of the cve-tracker to git
   * internal task
 {{{#!wiki comment
Line 55: Line 52:
   * LSS talk/discussion proposal
   * LSS program committee duties
   * !AppArmor kernel patch upstreaming
    * merge against security tree
    * some remaining work before the pull request can be sent
   * work with SUSE regarding the AppArmor patches for 4.13 kernel
   * apparmor pull request for 4.18.
   * work on apparmor 3.0 release
 }}}
Line 62: Line 56:
   * weekly role: happy place
   * sponsor two updates from last week
   * xdelta3 mir
   * !AppArmor patch review to support jjohansen's upstreaming work
   * MIRs
    * fprintd
   * profiling some pcp daemons
Line 67: Line 60:
   * Firefox updates
   * sponsor chromium-browser updates
   * embargoed issue
   * work on the Firefox start page
    * move away start.ubuntu.com
    * provide Ubuntu-specific design once we hear back
   * rust 1.27
   * firefox updates
Line 74: Line 63:
   * weekly role: happy place
   * internal tasks
   * technical communication
   * Ubuntu Core 15 updates
   * embargoed and internal work
  * leosilva
   * openSSL USN
   * security updates
Line 79: Line 68:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 82: Line 70:
  * none   * None
Line 85: Line 73:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-05-16.31.moin.txt http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Jun 25 16:31:11 2018 UTC

  • End: 16:45:09

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • sbeattie
  • sarnold
  • chrisccoulson
  • leosilva
  • ratliff

Not present

  • mdeslaur
  • jjohansen
  • amurray

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
    • We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users!
    • Ubuntu Security Team is hiring

  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • snapd PR reviews
      • adjust snap-confine to always use a device cgroup
      • follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement
      • pick up review-tools snap USNs phase1/part ii work as have time
    • sbeattie
      • kernel signoffs and fix kernel qrt test failures
      • finish the conversion of the cve-tracker to git
      • internal task
    • sarnold
      • MIRs
        • fprintd
      • profiling some pcp daemons
    • ChrisCoulson

      • rust 1.27
      • firefox updates
    • ratliff
      • embargoed and internal work
    • leosilva
      • openSSL USN
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt

MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)