20170306
|
Size: 2775
Comment:
|
Size: 3037
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20161205 | ## page was renamed from MeetingLogs/Security/20170206 ## page was copied from MeetingLogs/Security/20170123 |
| Line 4: | Line 5: |
| * '''When''': Mon Jan 9th 2017 16:30 UTC | * '''When''': Mon Jan 30th 2017 16:31 UTC |
| Line 7: | Line 8: |
| * '''Chaired By''': Emily Ratliff (ratliff) | * '''Chaired By''': Tyler Hicks (tyhicks) |
| Line 10: | Line 11: |
| * jdstrand * mdeslaur * sbeattie * tyhicks * jjohansen * sarnold |
|
| Line 11: | Line 18: |
| * jdstrand * sbeattie * sarnold |
|
| Line 17: | Line 21: |
| * jjohansen * mdeslaur * tyhicks |
* None |
| Line 23: | Line 25: |
| * Andreas Cadhalpun provided debdiffs for xenial and yakkety for ffmpeg (LP: #1648265 LP: #1647226) | * none |
| Line 26: | Line 28: |
| * make sure ufw 0.35-3 gets into Debian and zesty (to fix a ftbfs due to an updated netbase which broke the testsuite). trunk is fixed and packages prepared/tested, just need to make sure they get everywhere * plan to continue to help Tyler and Emily with sprint preparation, feedback and outcomes as necessary * have several PR reviews and followups for snapd 2.21 * organize snapd/policykit documents for future discussions * have a number of policy updates I'd like to have in place this week in time for snapd 2.21 * work on seccomp arg filtering policy in earnest |
* snappy PR reviews * better leverage seccomp arg filtering in snappy confinement policy * mdeslaur * weekly role: happy place * openssl updates * security updates |
| Line 33: | Line 35: |
| * weekly role: community * publish kernel USNs * openssh update * pick up a security update * tyhicks * weekly role: bug triage * finish and submit the second revision of seccomp/libseccomp patches to upstream * upload !AppArmor 2.11.0 to zesty * must workaround an !AppArmor utils bug (LP: #Bug:1628286) first * two embargoed issues * jjohansen * !AppArmor bugs * flock not mediated with 'k' (LP: #Bug:1658219) * disconnected path when using filesystem namespaces (LP: #Bug:1656121) * clean up and send xenial/yakkety !AppArmor patches to the kernel team * revise dconf/gsettings mediation patches after sync with desktop team * reply to tetsuo and finish kernel patch around !AppArmor data for a task * preparing next batch of !AppArmor kernel patches to upstream * maybe the changes to securityfs * sarnold * weekly role: cve triage * libapache2-mod-auth-mellon MIR * pick up another MIR * !ChrisCoulson * oxide updates * sponsor chromium-browser updates * firefox regression (LP: #Bug:1659922) * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation * Add JS dialogs to !UbuntuWebView (LP: #Bug:1637195) * ratliff |
|
| Line 34: | Line 66: |
| * finish the ssh updates I was working on * look in more depth at the aslr/relocatable symbols stuff that came up * have a few kernel signoffs to do due to respins * try to pick up another update as well * sarnold * weekly role: community * vacation/email catch-up * MIR * !ChrisCoulson * update Thunderbird * update Firefox PPAs * embargoed fix * https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation * ratliff * weekly role: bug triage * UCT extension * mdeslaur * weekly role: cve triage * tyhicks * sprinting * jjohansen * !AppArmor work |
* security updates for ubuntu-core 15.04 * notification process for incoming CVEs |
| Line 63: | Line 72: |
| * None | * none |
| Line 66: | Line 75: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-09-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-30-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Jan 30th 2017 16:31 UTC
End: 16:49 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
- ratliff
Not present
- None
Agenda
- Announcements
- none
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snappy PR reviews
- better leverage seccomp arg filtering in snappy confinement policy
- mdeslaur
- weekly role: happy place
- openssl updates
- security updates
- sbeattie
- weekly role: community
- publish kernel USNs
- openssh update
- pick up a security update
- tyhicks
- weekly role: bug triage
- finish and submit the second revision of seccomp/libseccomp patches to upstream
upload AppArmor 2.11.0 to zesty
must workaround an AppArmor utils bug (LP: #1628286) first
- two embargoed issues
- jjohansen
AppArmor bugs
clean up and send xenial/yakkety AppArmor patches to the kernel team
- revise dconf/gsettings mediation patches after sync with desktop team
reply to tetsuo and finish kernel patch around AppArmor data for a task
preparing next batch of AppArmor kernel patches to upstream
- maybe the changes to securityfs
- sarnold
- weekly role: cve triage
- libapache2-mod-auth-mellon MIR
- pick up another MIR
ChrisCoulson
- oxide updates
- sponsor chromium-browser updates
firefox regression (LP: #1659922)
https://blueprints.launchpad.net/oxide/+spec/ubuntu-webview-implementation
Add JS dialogs to UbuntuWebView (LP: #1637195)
- ratliff
- weekly role: happy place
- security updates for ubuntu-core 15.04
- notification process for incoming CVEs
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- none
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-01-30-16.31.moin.txt
MeetingLogs/Security/20170306 (last edited 2017-03-06 16:53:14 by tyhicks)