20171211
3459
Comment:
|
← Revision 63 as of 2017-12-11 16:49:23 ⇥
2714
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20170619 ## page was copied from MeetingLogs/Security/20170612 |
## page was copied from MeetingLogs/Security/20171204 |
Line 5: | Line 4: |
* '''When''': Mon June 19th 2017 16:30 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Dec 11th 2017 16:30 UTC * '''End''': 16:48 UTC |
Line 13: | Line 12: |
* sbeattie | |
Line 14: | Line 14: |
* jjohansen | * sarnold |
Line 20: | Line 20: |
* sbeattie * sarnold |
* jjohansen |
Line 25: | Line 24: |
* None | * none |
Line 28: | Line 27: |
* respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * PR reviews for fixing racy profile generation * bpf caching * system-key * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* snapd PR reviews * wayland slot * layouts * xdg-settings/userd * rewrite the snappy-app-dev udev script * finish review-tools updates for December * pickup brand store snap declarations as have time * pickup tun/tap and kmod spread test issues |
Line 40: | Line 36: |
* weekly role: CVE triage * openssl security update * ubuntu-support-status improvements * additional security updates * sbeattie |
|
Line 41: | Line 42: |
* release glibc and exim4 updates * ruby updates * additional security updates as time allows |
* CVE notifications for snap owners * upstream !AppArmor tasks * kernel CVE triage * tyhicks * weekly role: happy place * embargoed issues * squashfs reproduceability * nudge a number of things along: * snapd seccomp logging PR * libseccomp Xenial SRU * audit SRUs * libseccomp-golang upstream PR |
Line 45: | Line 55: |
* sbeattie | * jjohansen * !AppArmor mount mediation * prepare 4.14 !AppArmor backport for the Ubuntu kernel * update the backport kernels }}} * sarnold |
Line 47: | Line 62: |
* embargoed issue * sudo update * add UCT tracking for some new kernels }}} * tyhicks * weekly role: bug triage * !eCryptfs patch review (userspace and kernel) * fscrypt evaluation * seccomp patches * book upcoming travel * help leosilva with the update publishing process and possibly with the bug triage role * jjohansen * kernel USN publication * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * !AppArmor kernel patch upstreaming * push out namespacing patch set for review * work on an RFC patch set for networking/unix socket mediation * LSS program committee duties * book travel * help set the schedule {{{#!wiki comment * sarnold * weekly role: CVE triage * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work }}} |
* libteam MIR |
Line 77: | Line 64: |
* thunderbird update * investigate spidermonkey/gjs maintenance plan * embargoed issue |
* publish chromium-browser updates |
Line 82: | Line 67: |
* Ubuntu Core 15 updates * technical content and reporting |
* internal work * import KPI data into InfluxDB |
Line 85: | Line 70: |
* finished testing a libnl3 update for 12.04 ESM * publish it soon * pick up another security update * train for one of the generalist's roles |
* weekly role: bug triage * libxml2 updates * additional security updates |
Line 93: | Line 77: |
* none | * None |
Line 96: | Line 80: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-19-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-12-11-16.30.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Dec 11th 2017 16:30 UTC
End: 16:48 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jjohansen
Agenda
- Announcements
- none
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snapd PR reviews
- wayland slot
- layouts
- xdg-settings/userd
- rewrite the snappy-app-dev udev script
- finish review-tools updates for December
- pickup brand store snap declarations as have time
- pickup tun/tap and kmod spread test issues
- snapd PR reviews
- mdeslaur
- weekly role: CVE triage
- openssl security update
- ubuntu-support-status improvements
- additional security updates
- sbeattie
- weekly role: happy place
- CVE notifications for snap owners
upstream AppArmor tasks
- kernel CVE triage
- tyhicks
- weekly role: happy place
- embargoed issues
- squashfs reproduceability
- nudge a number of things along:
- snapd seccomp logging PR
- libseccomp Xenial SRU
- audit SRUs
- libseccomp-golang upstream PR
- sarnold
- weekly role: community
- libteam MIR
ChrisCoulson
- publish chromium-browser updates
- ratliff
- weekly role: happy place
- internal work
- import KPI data into InfluxDB
- leosilva
- weekly role: bug triage
- libxml2 updates
- additional security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-12-11-16.30.moin.txt
MeetingLogs/Security/20171211 (last edited 2017-12-11 16:49:23 by tyhicks)