20180813
3176
Comment:
|
3003
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170828 == Meeting == |
## page was copied from MeetingLogs/Security/20171002 == Meeting (DRAFT) == |
Line 4: | Line 4: |
* '''When''': Mon Sep 11th 2017 16:31 UTC * '''End''': 16:50 UTC |
* '''When''': Mon Oct 16th 2017 16:30 UTC * '''End''': 16:48 UTC |
Line 10: | Line 10: |
* jdstrand | |
Line 16: | Line 15: |
* chrisccoulson | |
Line 20: | Line 20: |
* chrisccoulson | * jdstrand |
Line 24: | Line 24: |
* Gianfranco Costamagna provided a debdiff for xenial for check-all-the-things (LP: #Bug:1597245) * Simon Quigley (tsimonq2) provided a debdiff for xenial for karchive (LP: #Bug:1712948) * James Cowgill (jcowgill) provided debdiffs for xenial and zesty for mbedtls (LP: #Bug:1714640) |
* Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for git (LP: #Bug:1719740) |
Line 28: | Line 26: |
{{{#!wiki comment | |
Line 29: | Line 28: |
* update the review tools * new license yaml * better error reporting * misc fixes * snapd layouts feature PR reviews (PR 3621) * investigate device cgroup issues in snapd * misc snapd policy updates * start next steps of uid/gid work in snapd |
* snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * per user mounts PR * continue uid/gid work for snap privilege dropping * prepare for sprint }}} |
Line 39: | Line 36: |
* post-vacation catchup * qemu updates * security updates |
* dnsmasq updates * ca-certificates updates * nss updates * additional security updates |
Line 44: | Line 42: |
* embargoed issues * libxmls2 update * kernel CVE triage * QRT and !AppArmor bugs to investigate |
* rally followups * finish branch conversions from bzr to gi * security team processes * perl update * kernel triage * additional security updates |
Line 49: | Line 49: |
* weekly role: happy place * attend Linux Security Summit * package fscrypt 0.2.1 * test LSM stacking patches * attend to libsecomp PR once the review starts |
* weekly role: community * finish packaging/testing fscrypt 0.2.1 * sprint prep * CVE reporting script * CVE triage workflow improvements * fianlize snapd PR for new seccomp logging features |
Line 55: | Line 56: |
* attend Linux Plumbers and Linux Security Summit * prep presentations/discussions around !AppArmor, LSM stacking, and LSM namespacing |
* 4.15 !AppArmor pull request * type splitting * unix domain sockets * !AppArmor patch review from mjg59 * revise LSM stacking patches |
Line 58: | Line 62: |
* weekly role: community * !AppArmor kernel patch reviews * python pyelftools MIR * rally prep * !ChrisCoulson * firefox updates * thunderbird updates * chromium-browser updates * !AppArmor kernel auditing changes * firefox start page mockup * ratliff |
|
Line 59: | Line 74: |
* help with !AppArmor kernel patch reviews * nghttp2 MIR * python elftools MIR * !ChrisCoulson * finish updating rustc to 1.19 * start on updating rustc to 1.20 * thunderbird update * sponsor chromium-browser update * fix bugs for Firefox 56 * menubar * FTBFS on Trusty * armhf issue * ratliff * weekly role: community * organizational and technical documentation |
* default install audits * internal task |
Line 76: | Line 78: |
* weekly role: cve triage * gdk-pixbuf updates * pick up security updates |
* weekly role: happy place * libpoppler updates * dnsmasq ESM update * additional security updates |
Line 86: | Line 89: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-11-16.31.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-02-16.30.moin.txt |
Meeting (DRAFT)
Who: SecurityTeam
When: Mon Oct 16th 2017 16:30 UTC
End: 16:48 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jdstrand
Agenda
- Announcements
Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for git (LP: #1719740)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- mdeslaur
- weekly role: happy place
- dnsmasq updates
- ca-certificates updates
- nss updates
- additional security updates
- sbeattie
- weekly role: happy place
- rally followups
- finish branch conversions from bzr to gi
- security team processes
- perl update
- kernel triage
- additional security updates
- tyhicks
- weekly role: community
- finish packaging/testing fscrypt 0.2.1
- sprint prep
- CVE reporting script
- CVE triage workflow improvements
- fianlize snapd PR for new seccomp logging features
- jjohansen
4.15 AppArmor pull request
- type splitting
- unix domain sockets
AppArmor patch review from mjg59
- revise LSM stacking patches
- sarnold
- weekly role: community
AppArmor kernel patch reviews
- python pyelftools MIR
- rally prep
ChrisCoulson
- firefox updates
- thunderbird updates
- chromium-browser updates
AppArmor kernel auditing changes
- firefox start page mockup
- ratliff
- weekly role: bug triage
- default install audits
- internal task
- sprint prep
- leosilva
- weekly role: happy place
- libpoppler updates
- dnsmasq ESM update
- additional security updates
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-02-16.30.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)