20180813
3003
Comment:
|
3096
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170612 | ## page was copied from MeetingLogs/Security/20170807 |
Line 4: | Line 4: |
* '''When''': Mon June 19th 2017 16:36 UTC * '''End''': 16:57 UTC |
* '''When''': Mon Aug 14th 2017 16:30 UTC * '''End''': 16:51 UTC |
Line 12: | Line 12: |
* sbeattie | |
Line 20: | Line 21: |
* sbeattie | * None |
Line 24: | Line 25: |
* None | * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for vlc (LP: #Bug:1709420) * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for menu-cache (LP: #Bug:1703564) |
Line 27: | Line 29: |
* PR reviews for fixing racy profile generation * bpf caching * system-key * respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* finish going through the wayland interface * be responsive to various snappy PRs and feature discussions * review the big udev tagging PR * avahi * snapd users/groups * portals * perform several PRs against snapd 2.27 * pick up new 'desktop' interface for gnome-shell, plasma, sway |
Line 39: | Line 38: |
* weekly role: bug triage * security updates * sbeattie * weekly role: cve triage * kernel USNs to publish * embargoed issue * security updates * openjdk-7 to sponsor * pick up others * !AppArmor reviews * minor QRT backlog of issues * tyhicks |
|
Line 40: | Line 51: |
* gnutls updates * libiberty updates * additional security updates as time allows {{{#!wiki comment * sbeattie * weekly role: community * embargoed issue * sudo update * add UCT tracking for some new kernels }}} * tyhicks * weekly role: bug triage * !eCryptfs patch review (userspace and kernel) * fscrypto evaluation * seccomp patches |
* finish making changes to seccomp v6 kernel patch set, test, and submit upstream * fscrypt pam module review and packaging * familiarize myself with the latest LSM stacking patch set * review snapd users/groups writeup |
Line 56: | Line 56: |
* upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * LSS program committee duties * work with SUSE regarding the AppArmor patches for 4.13 kernel |
|
Line 62: | Line 57: |
* start preparing patches for 4.14 | * revising networking/unix socket patches * type splitting to fix stored path issue in UNIX mediation * testing of LSM stacking and get feedback to Casey * !AppArmor test suite issues |
Line 64: | Line 62: |
* weekly role: CVE triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* weekly role: happy place * MIRs |
Line 69: | Line 65: |
* Firefox updates * sponsor chromium-browser updates * embargoed issues |
* firefox updates * chromium updates * update rustc to 1.19 |
Line 74: | Line 70: |
* Ubuntu Core 15 updates * CVE notifications |
* preparing KPIs |
Line 77: | Line 72: |
* new employee tasks | * weekly role: community * publish security updates that were tested last week * pick up security updates |
Line 82: | Line 79: |
* none | * None |
Line 85: | Line 82: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-12-16.36.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-07-16.30.moin.txt |
Meeting (DRAFT)
Who: SecurityTeam
When: Mon Aug 14th 2017 16:30 UTC
End: 16:51 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- None
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish going through the wayland interface
- be responsive to various snappy PRs and feature discussions
- review the big udev tagging PR
- avahi
- snapd users/groups
- portals
- perform several PRs against snapd 2.27
- pick up new 'desktop' interface for gnome-shell, plasma, sway
- mdeslaur
- weekly role: bug triage
- security updates
- sbeattie
- weekly role: cve triage
- kernel USNs to publish
- embargoed issue
- security updates
- openjdk-7 to sponsor
- pick up others
AppArmor reviews
- minor QRT backlog of issues
- tyhicks
- weekly role: happy place
- finish making changes to seccomp v6 kernel patch set, test, and submit upstream
- fscrypt pam module review and packaging
- familiarize myself with the latest LSM stacking patch set
- review snapd users/groups writeup
- jjohansen
AppArmor kernel patch upstreaming
- revising networking/unix socket patches
- type splitting to fix stored path issue in UNIX mediation
- testing of LSM stacking and get feedback to Casey
AppArmor test suite issues
- sarnold
- weekly role: happy place
- MIRs
ChrisCoulson
- firefox updates
- chromium updates
- update rustc to 1.19
- ratliff
- weekly role: happy place
- preparing KPIs
- leosilva
- weekly role: community
- publish security updates that were tested last week
- pick up security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-08-07-16.30.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)