20180813
3210
Comment:
|
← Revision 113 as of 2018-08-13 17:00:00 ⇥
2229
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170626 ## page was copied from MeetingLogs/Security/20170619 |
|
Line 5: | Line 3: |
* '''When''': Mon June 26th 2017 16:32 UTC * '''End''': 16:46 UTC |
* '''When''': Mon Aug 13 16:30:28 2018 UTC * '''End''': 16:43:16 |
Line 8: | Line 6: |
* '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
Line 11: | Line 9: |
Line 12: | Line 11: |
{{{#!wiki comment | |
Line 13: | Line 13: |
}}} | |
Line 14: | Line 15: |
* tyhicks | * jjohansen * sarnold |
Line 16: | Line 18: |
{{{#!wiki comment * leosilva }}} |
|
Line 17: | Line 22: |
* leosilva | * msalvatore * ebarretto |
Line 20: | Line 26: |
{{{#!wiki comment * mdeslaur |
|
Line 21: | Line 29: |
* sarnold | }}} * mdeslaur * leosilva * amurray |
Line 25: | Line 36: |
* None | * Generalist role rotation * CVE Triage: msalvatore, Bug Triage: sarnold, Community: sbeattie, Happy Place: amurray, mdeslaur, leosilva, ebarretto * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]] |
Line 28: | Line 41: |
* password-manager-service interface PR * finish testing and respond to feedback * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR * wayland interface, as time allows |
* continue ESM alignment * various snapd policy updates for 2.35 * brand store snap declarations * anbox-support * kubernetes-support interfaces * various snapd PR reviews * two embargoed items |
Line 37: | Line 49: |
* weekly role: happy place * apache2 updates * additional security updates as time allows |
* work related travel * embargoed issue * security updates |
Line 41: | Line 53: |
* weekly role: happy place * kernel USN publication * kernel CVE triage * sudo update * openssh update * !AppArmor patch review * tyhicks * weekly role: community * fscrypt evaluation * seccomp patches * !eCryptfs patch review (userspace and kernel) {{{#!wiki comment |
* bind9 updates * !AppArmor work * embargoed issues |
Line 54: | Line 57: |
* kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule }}} {{{#!wiki comment |
* !AppArmor 4.19 pull request * review mjg's secmark patch for !AppArmor * review David's mount patches and plan !AppArmor changes * !AppArmor 3.0 alpha |
Line 67: | Line 62: |
* weekly role: bug triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} |
* MIRs |
Line 73: | Line 64: |
* embargoed issue * thunderbird update * test new respin builds * chromium update to test and publish * investigate spidermonkey/gjs maintenance plan * see how feasible patch backporting is |
* GDM update * rust / cargo update * firefox update |
Line 80: | Line 68: |
* weekly role: CVE triage * Ubuntu Core 15 updates |
* internal work |
Line 83: | Line 70: |
* finish shadow testing * shadow sarnold in bug triage duties |
* libarchive USN * libxml2 update * wpa update is in security-proposed. Community testers welcome! * security updates * msalvatore * Node.js update * ESM alignment * Re-triage redis * security updates * ebarretto * tooling updates * CVE re-triage * security updates |
Line 86: | Line 84: |
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
Line 89: | Line 86: |
* none | * None |
Line 92: | Line 89: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-26-16.32.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-13-16.30.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Aug 13 16:30:28 2018 UTC
End: 16:43:16
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
- ratliff
- msalvatore
- ebarretto
Not present
- mdeslaur
- leosilva
- amurray
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: msalvatore, Bug Triage: sarnold, Community: sbeattie, Happy Place: amurray, mdeslaur, leosilva, ebarretto
Ubuntu Security Team is hiring
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- continue ESM alignment
- various snapd policy updates for 2.35
- brand store snap declarations
- anbox-support
- kubernetes-support interfaces
- various snapd PR reviews
- two embargoed items
- mdeslaur
- work related travel
- embargoed issue
- security updates
- sbeattie
- bind9 updates
AppArmor work
- embargoed issues
- jjohansen
AppArmor 4.19 pull request
review mjg's secmark patch for AppArmor
review David's mount patches and plan AppArmor changes
AppArmor 3.0 alpha
- sarnold
- MIRs
ChrisCoulson
- GDM update
- rust / cargo update
- firefox update
- ratliff
- internal work
- leosilva
- libarchive USN
- libxml2 update
- wpa update is in security-proposed. Community testers welcome!
- security updates
- msalvatore
- Node.js update
- ESM alignment
- Re-triage redis
- security updates
- ebarretto
- tooling updates
- CVE re-triage
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-13-16.30.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)