20180813

Differences between revisions 4 and 106 (spanning 102 versions)
Revision 4 as of 2017-06-19 16:27:40
Size: 3003
Editor: tyhicks
Comment:
Revision 106 as of 2018-07-23 17:30:21
Size: 2154
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20170612
== Meeting (DRAFT) ==
## page was copied from MeetingLogs/Security/20180625
== Meeting ==
Line 4: Line 4:
 * '''When''': Mon June 19th 2017 16:36 UTC
 * '''End''': 16:57 UTC
 * '''When''':  Mon Jun 25 16:31:11 2018 UTC
 * '''End''': 16:45:09
Line 7: Line 7:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 11: Line 11:
 {{{#!wiki comment
Line 12: Line 13:
 * tyhicks  }}}
 * sbeattie
 {{{#!wiki comment
Line 14: Line 17:
 }}}
Line 16: Line 20:
 * leosilva
Line 17: Line 22:
 * leosilva
Line 20: Line 24:
 * sbeattie  {{{#!wiki comment
 }}}
 * mdeslaur
 * jjohansen
 * amurray
Line 24: Line 32:
  * None   * Generalist role rotation
   * CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
  * We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users!
  * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]]
Line 27: Line 38:
   * PR reviews for fixing racy profile generation
    * bpf caching
    * system-key
   * respond to greengrass-support interface feedback
    * iterate on the policy once a devmode snap is available
   * password-manager-service interface PR
   * finish overlayfs/apparmor/snaps investigation
    * file overlay/apparmor bugs
   * snappy-debug work
    * fix to work with journald
   * miscellaneous snappy policy updates PR
   * snapd PR reviews
   * adjust snap-confine to always use a device cgroup
   * follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement
   * pick up review-tools snap USNs phase1/part ii work as have time
 {{{#!wiki comment
Line 39: Line 44:
   * weekly role: happy place
   * gnutls updates
   * libiberty updates
   * additional security updates as time allows
  {{{#!wiki comment
   * massive imagemagick update
   * security updates
 }}}
Line 45: Line 48:
   * weekly role: community
   * embargoed issue
   * sudo update
   * add UCT tracking for some new kernels
  }}}
  * tyhicks
   * weekly role: bug triage
   * !eCryptfs patch review (userspace and kernel)
   * fscrypto evaluation
   * seccomp patches
   * kernel signoffs and fix kernel qrt test failures
   * finish the conversion of the cve-tracker to git
   * internal task
 {{{#!wiki comment
Line 56: Line 53:
   * upstream linux-security-module reviews
    * new revision of LSM stacking patches
    * path based LSM changes from Tetsuo
   * LSS program committee duties
   * work with SUSE regarding the AppArmor patches for 4.13 kernel
   * !AppArmor kernel patch upstreaming
    * start preparing patches for 4.14
   * apparmor pull request for 4.18.
   * work on apparmor 3.0 release
 }}}
Line 64: Line 57:
   * weekly role: CVE triage
   * xdelta3 mir
   * gdm3 mir
   * !AppArmor patch review to support jjohansen's upstreaming work
   * MIRs
    * fprintd
   * profiling some pcp daemons
Line 69: Line 61:
   * Firefox updates
   * sponsor chromium-browser updates
   * embargoed issues
   * rust 1.27
   * firefox updates
Line 73: Line 64:
   * weekly role: happy place
   * Ubuntu Core 15 updates
   * CVE notifications
   * embargoed and internal work
Line 77: Line 66:
   * new employee tasks    * openSSL USN
   * security updates
Line 79: Line 69:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 82: Line 71:
  * none   * None
Line 85: Line 74:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-12-16.36.moin.txt  http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Jun 25 16:31:11 2018 UTC

  • End: 16:45:09

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • sbeattie
  • sarnold
  • chrisccoulson
  • leosilva
  • ratliff

Not present

  • mdeslaur
  • jjohansen
  • amurray

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
    • We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users!
    • Ubuntu Security Team is hiring

  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • snapd PR reviews
      • adjust snap-confine to always use a device cgroup
      • follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement
      • pick up review-tools snap USNs phase1/part ii work as have time
    • sbeattie
      • kernel signoffs and fix kernel qrt test failures
      • finish the conversion of the cve-tracker to git
      • internal task
    • sarnold
      • MIRs
        • fprintd
      • profiling some pcp daemons
    • ChrisCoulson

      • rust 1.27
      • firefox updates
    • ratliff
      • embargoed and internal work
    • leosilva
      • openSSL USN
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt

MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)