20180813
3404
Comment:
|
2303
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170612 | ## page was copied from MeetingLogs/Security/20180806 ## page was copied from MeetingLogs/Security/20180730 |
Line 4: | Line 5: |
* '''When''': Mon June 19th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Aug 6 16:31:08 2018 UTC * '''End''': 16:48:29 |
Line 7: | Line 8: |
* '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
Line 10: | Line 11: |
Line 12: | Line 14: |
* tyhicks | * sbeattie |
Line 14: | Line 16: |
{{{#!wiki comment * sarnold |
|
Line 15: | Line 19: |
}}} * leosilva |
|
Line 16: | Line 22: |
* leosilva | * msalvatore * ebarretto |
Line 19: | Line 26: |
* sbeattie | {{{#!wiki comment * mdeslaur * jjohansen }}} |
Line 21: | Line 31: |
* chrisccoulson * amurray |
|
Line 24: | Line 36: |
* None | * Generalist role rotation * CVE Triage: ratliff, Bug Triage: sbeattie, Community: amurray, Happy Place: mdeslaur, leosilva, ebarretto, msalvatore, sarnold * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]] |
Line 27: | Line 41: |
* respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * PR reviews for fixing racy profile generation * bpf caching * system-key * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* various snapd PR reviews * brand store snap declarations * an embargoed item * kubernetes-support interfaces |
Line 39: | Line 46: |
* weekly role: happy place * release glibc and exim4 updates * ruby updates * additional security updates as time allows {{{#!wiki comment |
* work related travel * embargoed issue |
Line 45: | Line 49: |
* weekly role: community | * intel-microcode updates (Community testing welcome!) * kernel triage and signoffs * internal tasks * jjohansen * !AppArmor bug work LP: #Bug:1783922 * report regression around bind mounts on 4.18 * review mjg's secmark patch for !AppArmor * review David's mount patches * !AppArmor 3.0 {{{#!wiki comment * sarnold * [[https://debconf18.debconf.org/talks/106-apparmor-30/|DebConf presentation]] * !ChrisCoulson * thunderbird 60 updates * Chromium updates |
Line 47: | Line 65: |
* sudo update * add UCT tracking for some new kernels }}} * tyhicks * weekly role: bug triage * !eCryptfs patch review (userspace and kernel) * fscrypt evaluation * seccomp patches * book upcoming travel * help leosilva with the update publishing process and possibly with the bug triage role * jjohansen * kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule {{{#!wiki comment * sarnold * weekly role: CVE triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} * !ChrisCoulson * thunderbird update * investigate spidermonkey/gjs maintenance plan * embargoed issue |
}}} |
Line 80: | Line 67: |
* weekly role: happy place * Ubuntu Core 15 updates * technical content and reporting |
* submit CVE details to MITRE * embargoed and internal work |
Line 84: | Line 70: |
* finished testing a libnl3 update for 12.04 ESM * publish it soon * pick up another security update * train for one of the generalist's roles |
* libxcursor and lftp updates * security updates * msalvatore * tooling work * security updates * ebarretto * libtomcrypt update * security updates |
Line 89: | Line 79: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 92: | Line 81: |
* none | * None |
Line 95: | Line 84: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-19-16.30.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-06-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Aug 6 16:31:08 2018 UTC
End: 16:48:29
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- jjohansen
- leosilva
- ratliff
- msalvatore
- ebarretto
Not present
- sarnold
- chrisccoulson
- amurray
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: ratliff, Bug Triage: sbeattie, Community: amurray, Happy Place: mdeslaur, leosilva, ebarretto, msalvatore, sarnold
Ubuntu Security Team is hiring
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- various snapd PR reviews
- brand store snap declarations
- an embargoed item
- kubernetes-support interfaces
- mdeslaur
- work related travel
- embargoed issue
- sbeattie
- intel-microcode updates (Community testing welcome!)
- kernel triage and signoffs
- internal tasks
- jjohansen
AppArmor bug work LP: #1783922
- report regression around bind mounts on 4.18
review mjg's secmark patch for AppArmor
- review David's mount patches
AppArmor 3.0
- ratliff
- submit CVE details to MITRE
- embargoed and internal work
- leosilva
- libxcursor and lftp updates
- security updates
- msalvatore
- tooling work
- security updates
- ebarretto
- libtomcrypt update
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-06-16.31.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)