20180423

Differences between revisions 44 and 95 (spanning 51 versions)
Revision 44 as of 2017-10-30 16:20:26
Size: 2754
Editor: tyhicks
Comment:
Revision 95 as of 2018-04-23 17:26:40
Size: 2488
Editor: emilyr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20171023
== Meeting (DRAFT) ==
## page was copied from MeetingLogs/Security/20180416
== Meeting ==
Line 4: Line 4:
 * '''When''': Mon Oct 30th 2017 16:30 UTC
 * '''End''': 16:45 UTC
 * '''When''': Mon Apr 23 16:32:34 2018 UTC
 * '''End''': 16:53:09
Line 7: Line 7:
 * '''Chaired By''': Tyler Hicks (tyhicks)  * '''Chaired By''': Emily Ratliff (ratliff)
Line 10: Line 10:
 {{{#!wiki comment
 * None
 }}}
Line 13: Line 16:
 * tyhicks
Line 17: Line 19:
 * leosilva
Line 18: Line 21:
 * leosilva
Line 20: Line 22:
 {{{#!wiki comment
Line 21: Line 24:
 * None  * jdstrand
 }}}
Line 25: Line 29:
  * None   * Generalist role rotation
   * CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva
 {{{#!wiki comment
  * Contributions
   * James Cowgill (jcowgill) provided a debdiff for xenial for ffmpeg (LP: #Bug:1697785)
   * Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for calibre (LP: #Bug:1758699)
 }}}
Line 28: Line 38:
   * finish some snappy-debug work based on sprint feedback
   * snapd PR reviews
    * snapd layouts feature PR reviews (PR 3621)
   * misc snapd interface policy updates
   * continue uid/gid work for snap privilege dropping
   * focus on snap usns
   * critical priority snapd PR reviews, if needed
   * sprint prep
   * time permitting: investigate resquashfs with respect to electron-builder
Line 34: Line 43:
   * weekly role: cve triage
   * curl updates
* mysql updates
   * webkitgtk+ updates
   * additional security updates
   * mysql update publication
   * embargoed issue
   * security updates
Line 40: Line 47:
   * weekly role: happy place
   * start work on CVE notifications for snap owners
   * !AppArmor work to support Debian's !AppArmor-in-Debian sprint
   * security update
Line 45: Line 48:
  * tyhicks
   * weekly role: happy place
   * eCryptfs patch review
   * squashfs reproduceability
   * embargoed issues
   * gcc retpoline backports for 12.04 ESM
   * check over the release notes and security features wiki pages for 18.04
   * investigate the apparmor parser userspace tests failures in some environments
   * misc review work
Line 51: Line 53:
   * 4.15 !AppArmor pull request
    * type splitting
    * unix domain sockets RFC
   * !AppArmor bug backlog
   * investigate several new 2.13 bugs, including an issue in expr-simplify
   * review mount changes from David Howells
   * follow-up on on bugs LP #Bug:1750594 and #Bug:1679704
   * revisions for policy hashing and policy versioning patching
   * LSM stacking review for Casey
   * work on prompting prototype
Line 56: Line 60:
   * weekly role: happy place
   * !AppArmor work to support Debian's !AppArmor-in-Debian sprint
   * spice-vdagent MIR
   * pcp MIR
   * MIRs
    * xe-guest-utilities
Line 61: Line 63:
   * chromium-browser update to test and publish
   * update to rust 1.20 in all releases
    * artful is done
   * !AppArmor kernel auditing changes
   * rust 1.25 updates - fix armhf and arm64 test failures
   * chromium-browser updates
   * thunderbolt updates
Line 66: Line 67:
   * weekly role: community
   * internal duties
   * embargoed and internal work
   * sprint prep
Line 69: Line 70:
   * weekly role: bug triage
   * 12.04 ESM updates
   * additional
security updates
   * ghostscript update
   *
ruby triage
   * security updates
Line 73: Line 74:
 The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
Line 79: Line 79:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-23-16.31.moin.txt http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Apr 23 16:32:34 2018 UTC

  • End: 16:53:09

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Emily Ratliff (ratliff)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • jjohansen
  • sarnold
  • chrisccoulson
  • leosilva
  • ratliff

Agenda

  • Announcements
    • Generalist role rotation
      • CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • focus on snap usns
      • critical priority snapd PR reviews, if needed
      • sprint prep
      • time permitting: investigate resquashfs with respect to electron-builder
    • mdeslaur
      • mysql update publication
      • embargoed issue
      • security updates
    • sbeattie
      • kernel CVE triage
      • gcc retpoline backports for 12.04 ESM
      • check over the release notes and security features wiki pages for 18.04
      • investigate the apparmor parser userspace tests failures in some environments
      • misc review work
    • jjohansen
      • investigate several new 2.13 bugs, including an issue in expr-simplify
      • review mount changes from David Howells
      • follow-up on on bugs LP #1750594 and #1679704

      • revisions for policy hashing and policy versioning patching
      • LSM stacking review for Casey
      • work on prompting prototype
    • sarnold
      • MIRs
        • xe-guest-utilities
    • ChrisCoulson

      • rust 1.25 updates - fix armhf and arm64 test failures
      • chromium-browser updates
      • thunderbolt updates
    • ratliff
      • embargoed and internal work
      • sprint prep
    • leosilva
      • ghostscript update
      • ruby triage
      • security updates
  • Highlighted packages

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt

MeetingLogs/Security/20180423 (last edited 2018-04-23 17:26:40 by emilyr)