20180813
3384
Comment:
|
2099
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170619 == Meeting (DRAFT) == |
== Meeting == |
Line 4: | Line 3: |
* '''When''': Mon June 26th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Jun 25 16:31:11 2018 UTC * '''End''': 16:45:09 |
Line 7: | Line 6: |
* '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
Line 11: | Line 10: |
{{{#!wiki comment | |
Line 12: | Line 12: |
}}} | |
Line 13: | Line 14: |
* tyhicks | {{{#!wiki comment * jjohansen }}} |
Line 16: | Line 19: |
* leosilva | |
Line 17: | Line 21: |
* leosilva | |
Line 20: | Line 23: |
{{{#!wiki comment }}} * mdeslaur |
|
Line 21: | Line 27: |
* amurray | |
Line 24: | Line 31: |
* None | * Generalist role rotation * CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold * We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users! * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]] |
Line 27: | Line 37: |
* respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * PR reviews for fixing racy profile generation * bpf caching * system-key * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* snapd PR reviews * adjust snap-confine to always use a device cgroup * follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement * pick up review-tools snap USNs phase1/part ii work as have time {{{#!wiki comment |
Line 39: | Line 43: |
* weekly role: happy place * release glibc and exim4 updates * ruby updates * additional security updates as time allows |
* massive imagemagick update * security updates }}} |
Line 44: | Line 47: |
* weekly role: happy place * embargoed issue * sudo update * add UCT tracking for some new kernels * tyhicks * weekly role: community * !eCryptfs patch review (userspace and kernel) * fscrypt evaluation * seccomp patches * book upcoming travel * help leosilva with the update publishing process and possibly with the bug triage role {{{#!wiki comment |
* kernel signoffs and fix kernel qrt test failures * finish the conversion of the cve-tracker to git * internal task {{{#!wiki comment |
Line 57: | Line 52: |
* kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} |
* apparmor pull request for 4.18. * work on apparmor 3.0 release }}} |
Line 69: | Line 56: |
* weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* MIRs * fprintd * profiling some pcp daemons |
Line 74: | Line 60: |
* thunderbird update * investigate spidermonkey/gjs maintenance plan * embargoed issue |
* rust 1.27 * firefox updates |
Line 78: | Line 63: |
* weekly role: CVE triage * Ubuntu Core 15 updates * technical content and reporting |
* embargoed and internal work |
Line 82: | Line 65: |
* finished testing a libnl3 update for 12.04 ESM * publish it soon * pick up another security update * train for one of the generalist's roles |
* openSSL USN * security updates |
Line 87: | Line 68: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 90: | Line 70: |
* none | * None |
Line 93: | Line 73: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-19-16.30.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Jun 25 16:31:11 2018 UTC
End: 16:45:09
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- sbeattie
- sarnold
- chrisccoulson
- leosilva
- ratliff
Not present
- mdeslaur
- jjohansen
- amurray
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: ratliff, Bug Triage: sbeattie, Community: mdeslaur, Happy Place: leosilva, sarnold
- We welcome Alex Murray to the Ubuntu Security Team today! Welcome Alex, we are thrilled that you are joining us to help continue improving security for Ubuntu users!
Ubuntu Security Team is hiring
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd PR reviews
- adjust snap-confine to always use a device cgroup
- follow up on unsquashfs issue (ie, work on re-enabling resquashfs enforcement
- pick up review-tools snap USNs phase1/part ii work as have time
- sbeattie
- kernel signoffs and fix kernel qrt test failures
- finish the conversion of the cve-tracker to git
- internal task
- sarnold
- MIRs
- fprintd
- profiling some pcp daemons
- MIRs
ChrisCoulson
- rust 1.27
- firefox updates
- ratliff
- embargoed and internal work
- leosilva
- openSSL USN
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-06-25-16.31.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)