20180813

Differences between revisions 63 and 113 (spanning 50 versions)
Revision 63 as of 2017-12-11 16:49:23
Size: 2714
Editor: tyhicks
Comment:
Revision 113 as of 2018-08-13 17:00:00
Size: 2229
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20171204
Line 4: Line 3:
 * '''When''': Mon Dec 11th 2017 16:30 UTC
 * '''End''': 16:48 UTC
 * '''When''': Mon Aug 13 16:30:28 2018 UTC
 * '''End''': 16:43:16
Line 7: Line 6:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 10: Line 9:
Line 11: Line 11:
 {{{#!wiki comment
Line 12: Line 13:
 }}}
Line 13: Line 15:
 * tyhicks  * jjohansen
Line 16: Line 18:
 {{{#!wiki comment
 * leosilva
 }}}
Line 17: Line 22:
 * leosilva  * msalvatore
 * ebarretto
Line 20: Line 26:
 {{{#!wiki comment
 * mdeslaur
Line 21: Line 29:
 }}}
 * mdeslaur
 * leosilva
 * amurray
Line 24: Line 36:
  * none   * Generalist role rotation
   * CVE Triage: msalvatore, Bug Triage: sarnold, Community: sbeattie, Happy Place: amurray, mdeslaur, leosilva, ebarretto
  * Ubuntu Security Team [[https://grnh.se/8c0a6c1f1|is hiring]]
Line 27: Line 41:
   * snapd PR reviews
    * wayland slot
    * layouts
    * xdg-settings/userd
   * rewrite the snappy-app-dev udev script
   * finish review-tools updates for December
   * pickup brand store snap declarations as have time
   * pickup tun/tap and kmod spread test issues
   * continue ESM alignment
   * various snapd policy updates for 2.35
   * brand store snap declarations
   * anbox-support
   * kubernetes-support interfaces
   * various snapd PR reviews
   * two embargoed items
Line 36: Line 49:
   * weekly role: CVE triage
   * openssl security update
   * ubuntu-support-status improvements
   * additional security updates
   * work related travel
   * embargoed issue
   * security updates
Line 41: Line 53:
   * weekly role: happy place
   * CVE notifications for snap owners
   * upstream !AppArmor tasks
   * kernel CVE triage
  * tyhicks
   * weekly role: happy place
   * bind9 updates
   * !AppArmor work
Line 48: Line 56:
   * squashfs reproduceability
   * nudge a number of things along:
    * snapd seccomp logging PR
    * libseccomp Xenial SRU
    * audit SRUs
    * libseccomp-golang upstream PR
  {{{#!wiki comment
Line 56: Line 57:
   * !AppArmor mount mediation
   * prepare 4.14 !AppArmor backport for the Ubuntu kernel
   * update the backport kernels
  }}}
   * !AppArmor 4.19 pull request
   * review mjg's secmark patch for !AppArmor
   * review David's mount patches and plan !AppArmor changes
   * !AppArmor 3.0 alpha
Line 61: Line 62:
   * weekly role: community
   * libteam MIR
   * MIRs
Line 64: Line 64:
   * publish chromium-browser updates    * GDM update
   * rust / cargo update
   * firefox update
Line 66: Line 68:
   * weekly role: happy place
Line 68: Line 69:
   * import KPI data into InfluxDB
Line 70: Line 70:
   * weekly role: bug triage
   * libxml2 updates
   * additional security updates
   * libarchive USN
   * libxml2 update
   * wpa update is in security-proposed. Community testers welcome!
   * security updates
  * msalvatore
   * Node.js update
   * ESM alignment
   * Re-triage redis
   * security updates
  * ebarretto
   * tooling updates
   * CVE re-triage
   * security updates
Line 74: Line 84:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 80: Line 89:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-12-11-16.30.moin.txt http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-13-16.30.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Aug 13 16:30:28 2018 UTC

  • End: 16:43:16

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • sbeattie
  • jjohansen
  • sarnold
  • chrisccoulson
  • ratliff
  • msalvatore
  • ebarretto

Not present

  • mdeslaur
  • leosilva
  • amurray

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: msalvatore, Bug Triage: sarnold, Community: sbeattie, Happy Place: amurray, mdeslaur, leosilva, ebarretto
    • Ubuntu Security Team is hiring

  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • continue ESM alignment
      • various snapd policy updates for 2.35
      • brand store snap declarations
      • anbox-support
      • kubernetes-support interfaces
      • various snapd PR reviews
      • two embargoed items
    • mdeslaur
      • work related travel
      • embargoed issue
      • security updates
    • sbeattie
      • bind9 updates
      • AppArmor work

      • embargoed issues
    • jjohansen
      • AppArmor 4.19 pull request

      • review mjg's secmark patch for AppArmor

      • review David's mount patches and plan AppArmor changes

      • AppArmor 3.0 alpha

    • sarnold
      • MIRs
    • ChrisCoulson

      • GDM update
      • rust / cargo update
      • firefox update
    • ratliff
      • internal work
    • leosilva
      • libarchive USN
      • libxml2 update
      • wpa update is in security-proposed. Community testers welcome!
      • security updates
    • msalvatore
      • Node.js update
      • ESM alignment
      • Re-triage redis
      • security updates
    • ebarretto
      • tooling updates
      • CVE re-triage
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-08-13-16.30.moin.txt

MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)