20180813
3155
Comment:
|
2998
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170619 == Meeting == |
## page was copied from MeetingLogs/Security/20170918 == Meeting (DRAFT) == |
Line 4: | Line 4: |
* '''When''': Mon June 26th 2017 16:32 UTC * '''End''': 16:46 UTC |
* '''When''': Mon Oct 2nd 2017 16:32 UTC * '''End''': 16:50 UTC |
Line 14: | Line 14: |
* jjohansen | |
Line 19: | Line 20: |
* jjohansen | |
Line 24: | Line 24: |
* None | * Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for jython (LP: #Bug:1714728) |
Line 27: | Line 27: |
* password-manager-service interface PR * finish testing and respond to feedback * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR * wayland interface, as time allows |
* snapd layouts feature PR reviews (PR 3621) * investigate device cgroup issues in snapd * start next steps of uid/gid work in snapd |
Line 36: | Line 31: |
* weekly role: happy place * apache2 updates * additional security updates as time allows |
* weekly role: community * apache updates * bind9 regression fix and new dnssec keys * security updates |
Line 40: | Line 36: |
* weekly role: happy place | * weekly role: bug triage |
Line 42: | Line 38: |
* kernel CVE triage * sudo update * openssh update |
* libxmls2 update * rally prep |
Line 47: | Line 42: |
* weekly role: community * fscrypt evaluation * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment |
* weekly role: cve triage * Linux Security Summit followups * attend to libseccomp PR feedback * prepare minimal libseccomp Artful upload * finish packaging/testing fscrypt 0.2.1 * rally prep * embargoed issue |
Line 53: | Line 50: |
* kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} |
* Linux Security Summit followups * rally prep * get a revision of LSM stacking patches to the kernel team * !AppArmor unix socket mediation work to upstream the remaining Ubuntu delta |
Line 66: | Line 56: |
* weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work |
* weekly role: community * !AppArmor kernel patch reviews * python pyelftools MIR * rally prep |
Line 72: | Line 62: |
* embargoed issue * thunderbird update * test new respin builds * chromium update to test and publish * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is |
* firefox 56 updates * get unity menubar working again * trusty build failure to fix * safe browsing issue * test/sponsor chromium-browser update * updating rustc for firefox |
Line 79: | Line 69: |
* weekly role: CVE triage * Ubuntu Core 15 updates |
* weekly role: happy place * default install audits * improve weekly reports w/ KPI content * organizational and technical documentation |
Line 82: | Line 74: |
* finish shadow testing * shadow sarnold in bug triage duties |
* weekly role: happy place * pick up security updates |
Line 88: | Line 80: |
* none | * None |
Line 91: | Line 83: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-18-16.32.moin.txt |
Meeting (DRAFT)
Who: SecurityTeam
When: Mon Oct 2nd 2017 16:32 UTC
End: 16:50 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- chrisccoulson
- ratliff
- leosilva
Not present
- sarnold
Agenda
- Announcements
Simon Quigley (tsimonq2) provided debdiffs for trusty-zesty for jython (LP: #1714728)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd layouts feature PR reviews (PR 3621)
- investigate device cgroup issues in snapd
- start next steps of uid/gid work in snapd
- mdeslaur
- weekly role: community
- apache updates
- bind9 regression fix and new dnssec keys
- security updates
- sbeattie
- weekly role: bug triage
- kernel USN publication
- libxmls2 update
- rally prep
AppArmor patch review
- tyhicks
- weekly role: cve triage
- Linux Security Summit followups
- attend to libseccomp PR feedback
- prepare minimal libseccomp Artful upload
- finish packaging/testing fscrypt 0.2.1
- rally prep
- embargoed issue
- jjohansen
- Linux Security Summit followups
- rally prep
- get a revision of LSM stacking patches to the kernel team
AppArmor unix socket mediation work to upstream the remaining Ubuntu delta
ChrisCoulson
- firefox 56 updates
- get unity menubar working again
- trusty build failure to fix
- safe browsing issue
- test/sponsor chromium-browser update
- updating rustc for firefox
- firefox 56 updates
- ratliff
- weekly role: happy place
- default install audits
- improve weekly reports w/ KPI content
- organizational and technical documentation
- leosilva
- weekly role: happy place
- pick up security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-09-18-16.32.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)