20180813
3336
Comment:
|
3066
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170626 == Meeting == |
## page was copied from MeetingLogs/Security/20171030 == Meeting (DRAFT) == |
Line 4: | Line 4: |
* '''When''': Mon July 10th 2017 16:29 UTC * '''End''': 16:42 UTC |
* '''When''': Mon Nov 6th 2017 16:33 UTC * '''End''': 16:45 UTC |
Line 11: | Line 11: |
* mdeslaur | |
Line 13: | Line 14: |
* jjohansen * sarnold |
|
Line 18: | Line 21: |
* mdeslaur * jjohansen * sarnold |
* None |
Line 24: | Line 25: |
* Otto Kekäläinen (otto) provided updates for trusty for mariadb-5.5 (LP: #Bug:1698689) | * Lucas Kocia (lkocia) provided a debdiff for xenial for firewalld (LP: #Bug:1617617) * Jeremy Bicha (jbicha) provided a debdiff for zesty for gdm3 (LP: #Bug:1729354) |
Line 27: | Line 29: |
* be involved in various snappy PRs and feature discussions * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * sprint prep * wayland interface, as time allows {{{#!wiki comment |
* finish some snappy-debug work based on sprint feedback * snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * track udev tagging and device cgroup regression * verify uhid interface is still working * broadcom-asic-control interface bug * misc snapd interface policy updates for 2.29 * continue uid/gid work for snap privilege dropping |
Line 34: | Line 38: |
* weekly role: happy place * apache2 updates * additional security updates as time allows }}} |
* weekly role: bug triage * quagga updates * additional security updates |
Line 39: | Line 42: |
* weekly role: CVE triage * security updates * !AppArmor patch review * kernel CVE triage |
* weekly role: cve triage * followups from !AppArmor-in-Debian sprint * kernel signoffs and USN publications * openjdk-8 updates to test and publish * CVE notifications for snap owners |
Line 45: | Line 49: |
* fscrypt evaluation * sprint prep * CVE tracking in snaps * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment |
* eCryptfs patch review * squashfs reproduceability * embargoed issues |
Line 52: | Line 53: |
* kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} {{{#!wiki comment |
* 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog |
Line 65: | Line 58: |
* weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} |
* weekly role: happy place * spice-vdagent MIR * pcp MIR * !AppArmor patch review * embargoed issue |
Line 71: | Line 64: |
* chromium-browser update * rust transition for future firefox updates * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is |
* chromium-browser update to test and publish * look into unscheduled firefox release from last week * update to rust 1.21 in all releases * !AppArmor kernel auditing changes |
Line 76: | Line 69: |
* weekly role: happy place * writing assignments * integrating InfluxDB into security KPIs * leosilva |
|
Line 77: | Line 74: |
* sponsor vlc updates * sprint prep * sizing effort and other internal tasks * Ubuntu Core 15 updates * leosilva * publish 12.04 ESM updates * libgcrypt * expat * libtiff * bind9 * finish testing 12.04 ESM updates * jbig2 * openldap * shadow sarnold in bug triage duties |
* security updates |
Line 95: | Line 79: |
* none | * None |
Line 98: | Line 82: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-07-10-16.29.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-30-16.33.moin.txt |
Meeting (DRAFT)
Who: SecurityTeam
When: Mon Nov 6th 2017 16:33 UTC
End: 16:45 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- None
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish some snappy-debug work based on sprint feedback
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- track udev tagging and device cgroup regression
- verify uhid interface is still working
- broadcom-asic-control interface bug
- misc snapd interface policy updates for 2.29
- continue uid/gid work for snap privilege dropping
- mdeslaur
- weekly role: bug triage
- quagga updates
- additional security updates
- sbeattie
- weekly role: cve triage
followups from AppArmor-in-Debian sprint
- kernel signoffs and USN publications
- openjdk-8 updates to test and publish
- CVE notifications for snap owners
- tyhicks
- weekly role: happy place
- eCryptfs patch review
- squashfs reproduceability
- embargoed issues
- jjohansen
4.15 AppArmor pull request
- type splitting
- unix domain sockets RFC
AppArmor bug backlog
- sarnold
- weekly role: happy place
- spice-vdagent MIR
- pcp MIR
AppArmor patch review
- embargoed issue
ChrisCoulson
- chromium-browser update to test and publish
- look into unscheduled firefox release from last week
- update to rust 1.21 in all releases
AppArmor kernel auditing changes
- ratliff
- weekly role: happy place
- writing assignments
- integrating InfluxDB into security KPIs
- leosilva
- weekly role: community
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-30-16.33.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)